CVE Alert: CVE-2024-10966
Vulnerability Summary: CVE-2024-10966 A vulnerability, which was classified as critical, has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected by this...
Vulnerability Summary: CVE-2024-10966 A vulnerability, which was classified as critical, has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected by this...
Vulnerability Summary: CVE-2020-11916 An issue was discovered in Siime Eye 14.1.00000001.3.330.0.0.3.14. The password for the root user is hashed using...
Vulnerability Summary: CVE-2024-51758 Filament is a collection of full-stack components for accelerated Laravel development. All Filament features that interact with...
Vulnerability Summary: CVE-2024-10967 A vulnerability was found in code-projects E-Health Care System 1.0. It has been classified as critical. Affected...
Vulnerability Summary: CVE-2024-51989 Password Pusher is an open source application to communicate sensitive information over the web. A cross-site scripting...
Ransomware Group: BIANLIAN VICTIM NAME: Healthcare Management Systems NOTE: No files or stolen information are by RedPacket Security. Any legal...
Ransomware Group: CACTUS VICTIM NAME: ottosimoncouk NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Thursday added a now-patched critical security flaw impacting Palo Alto Networks...
Cybersecurity researchers have flagged a new malware campaign that infects Windows systems with a Linux virtual instance containing a backdoor...
Multiple vulnerabilities were identified in Android. A remote attacker could exploit some of these vulnerabilities to trigger sensitive information disclosure, denial...
Vulnerability Summary: CVE-2024-48290 An issue in the Bluetooth Low Energy implementation of Realtek RTL8762E BLE SDK v1.4.0 allows attackers to...
Vulnerability Summary: CVE-2024-51994 Combodo iTop is a web based IT Service Management tool. In affected versions uploading a text file...
Vulnerability Summary: CVE-2024-51995 Combodo iTop is a web based IT Service Management tool. An attacker can request any `route` we...
Vulnerability Summary: CVE-2024-45794 devtron is an open source tool integration platform for Kubernetes. In affected versions an authenticated user (with...
Vulnerability Summary: CVE-2024-51993 Combodo iTop is a web based IT Service Management tool. An attacker accessing a backup file or...
Vulnerability Summary: CVE-2024-10969 A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been rated as critical....
Vulnerability Summary: CVE-2024-10968 A vulnerability was found in 1000 Projects Bookstore Management System 1.0. It has been declared as critical....
Vulnerability Summary: CVE-2024-49523 Adobe Experience Manager versions 6.5.20 and earlier are affected by a stored Cross-Site Scripting (XSS) vulnerability that...
Vulnerability Summary: CVE-2024-49524 Adobe Experience Manager versions 6.5.20 and earlier are affected by a DOM-based Cross-Site Scripting (XSS) vulnerability that...
Vulnerability Summary: CVE-2024-10975 Nomad Community and Nomad Enterprise ("Nomad") volume specification is vulnerable to arbitrary cross-namespace volume creation through unauthorized...
In today's digital landscape, where cyber threats loom large, security awareness training is not just an option but a necessity....
AI adoption is reshaping cybersecurity, giving defenders an upper hand over cybercriminals, as highlighted by Trend Micro's Robert McArdle. Cybercriminals’...
In the UK, cybersecurity professionals are witnessing significant wage growth that surpasses inflation, yet many are facing increased job-related stress....
The UK regulator emphasizes the need for strengthened data protection in AI recruitment tools to safeguard job seekers' rights. The...