vulnerabilities
Despite the low sophistication of the group’s toolset, it is a threat to governments in Europe because... a significant number of internet-facing applications are not regularly updated although they are known to contain vulnerabilities.”
"We have also seen devices... getting the implant successfully installed through an as of yet undetermined mechanism."
A CVSS 9.8, pre-auth RCE that lets an attacker execute arbitrary code without user interaction is wormable on systems where Message Queuing is enabled.
Do you, or do you not, need to get your knickers in a twist? Well, that depends on your risk tolerance..
A study out of Germany has highlighted shortcomings in the CVSS system and the way security vulnerabilities are assessed and scored
The little-known hacking technique of subdomain hijacking is threatening thousands of sites and their visitors despite efforts to eradicate
Want to let criminals “query your databases, add/change/delete files, export data or files off your server”? No, then you should probably be paying close attention to whether you are running Adobe ColdFusion and if you are exposed...
Ivanti is warning of attacks on its MobileIron platform due to improper handling of APIs