Đinh Văn MạnhforFIS Securityblog.fiscybersec.com·Dec 19, 2024Palo Alto Networks Issues Emergency Patch For Zero-Day VulnerabilityPalo Alto Networks has released patches for two critical zero-day vulnerabilities in their firewall system. These vulnerabilities have been actively exploited, threatening the security of many organizations using the company's products. Details about...Newslettersthreat intelligence
Mahira Technology Private Limitedmahiratechnology.hashnode.dev·Dec 13, 2024Transform Your Terraform Security Game with This CheckOV Implementation Hack using CircleciIntroduction :- Hey there! Let’s talk about something that’s really helpful when working with Terraform — implementing CheckOV in your CircleCI pipeline. If you’ve been wondering how to make your infrastructure code more secure and compliant, you’re ...Terraform
Auth0x78forGDSC NIT Silchar Blogblog.gdscnits.in·Nov 25, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...2 likes·249 readsBuffer Overfow
Tran Hoang PhongforFIS Securityblog.fiscybersec.com·Nov 17, 2024Citrix và Fortinet cập nhật các bản vá bảo mật quan trọngNgày 12/11/2024, Citrix và Fortinet đã công bố bản vá cho hơn một chục lỗ hổng bảo mật, bao gồm các lỗ hổng nghiêm trọng ảnh hưởng đến NetScaler và FortiOS. 1. Chi tiết thông tin lỗ hổng của Citrix Citrix đã phát hành bản sửa lỗi cho: Hai lỗ hổng tr...66 readsNewslettersFortinet
Ronald Bartelshubandspoke.amastelek.com·Nov 8, 2024🥷Fortinet’s Persistent Vulnerabilities | A Persistent Threat & Essential Mitigations🥸Over recent years, Fortinet’s infrastructure has faced numerous, often critical vulnerabilities, many of which are actively exploited and recurrently flagged by CISA as among the most widely exploitable. In some cases, Fortinet vulnerabilities outpac...10 likesFortinet
Rao Waqas Akramraowaqasakram.hashnode.dev·Oct 24, 2024🌐 Celebrating 25 Years of CVEs! 🌐🌐 Celebrating 25 Years of CVEs! 🌐 Tenable has released an insightful article on the evolution of vulnerabilities, marking 25 years of CVE. From the first 321 records in 1999 to over 240,000 today, this milestone highlights the critical impact of ...36 readsvulnerabilities
Đinh Văn MạnhforFIS Securityblog.fiscybersec.com·Oct 22, 2024Atlassian Vá Các Lỗ Hổng Bảo Mật Trong Bitbucket, Confluence, và JiraAtlassian, công ty nổi tiếng với các sản phẩm quản lý dự án và cộng tác như Bitbucket, Confluence, và Jira, đã phát hành các bản vá bảo mật quan trọng để khắc phục nhiều lỗ hổng nghiêm trọng. Những lỗ hổng này có thể bị khai thác để tấn công hệ thống...NewslettersBitbucket
Shruti RajeshforZySec AIblog.zysec.ai·Oct 14, 2024The Role of AI in Mitigating the Latest Zero-Day VulnerabilitiesIn the wild, wild west of the digital universe, zero-day vulnerabilities are the renegade bandits, lurking in the shadows, ready to wreak havoc faster than you can say “cyberspace showdown.” But fear not! AI is here, galloping in like a mustachioed s...zysec
Auth0x78auth0x78-blog.hashnode.dev·Oct 10, 2024Buffer Overflow Basics: A Simple Guide to Understanding VulnerabilitiesIntroduction Have you ever wondered how seemingly harmless input can compromise a program's security? Buffer overflows have become a notorious weapon in the hands of attackers, allowing them to manipulate memory and execute malicious code. In this bl...1 like·44 readsBuffer Overfow
Isael Melendezismele.hashnode.dev·Oct 9, 2024Learning Nessus EssentialsWhen we start in the cybersecurity field, principally studying to obtain CompTIA Security+ and more closely to Vulnerability Scanning Tools in theory, you may remember the name “ NESSUS”. I’m pretty sure you remembered it. So, What’s NESSUS? Why is i...3 likesnessus