Engage in discussions about vulnerabilities, risks, threat intelligence, and strategies to mitigate cyber exposures effectively.
Viewing 4 topics - 1 through 4 (of 4 total)
-
- Topic
- Voices
- Last Post
-
-
Alert! Zerologon: Your Windows Domain Controller Can’t Handle Zero Properly Microsoft team patched a critical and exciting vulnerability in the Netlogon Remote Protocol of the Windows server last month. zero logon vulnerability discovered by the Cybersecurity firm Secura (dubbed as Zerologon), has received the highest severity score of 10.0. The vulnerability is identified ...Microsoft team patched a critical and exciting vulnerability in the Netlogon Remote Protocol of the Windows server last month. zero logon vulnerability discovered by the Cybersecurity firm Secura (dubbed as Zerologon), has received the highest severity score of 10.0. The vulnerability is identified ...
- 1
-
SecPod CyberBulletin 29th Issue Apple VisionOS 2.1 Security Vulnerabilities Apple’s VisionOS 2.1 has been found to contain several critical vulnerabilities (CVE-2024-44255 and CVE-2024-44273) that could allow attackers to exploit the system. CVSS Score: 7.8, 8.4 Chrome Security: Out-of-Bounds WebRTC Vulnerability Google Chrome’...Apple VisionOS 2.1 Security Vulnerabilities Apple’s VisionOS 2.1 has been found to contain several critical vulnerabilities (CVE-2024-44255 and CVE-2024-44273) that could allow attackers to exploit the system. CVSS Score: 7.8, 8.4 Chrome Security: Out-of-Bounds WebRTC Vulnerability Google Chrome’...
- 1
-
Apache Log4j Vulnerability All Java applications come with Log4j, a logging library/facade that allows programmers to release output logs to numerous output targets. Log4j is an integral part of Apache Logging Services, which cybercriminals can use to launch RCE attacks due to a vulnerability. The Log4j bug has sent shockwav...All Java applications come with Log4j, a logging library/facade that allows programmers to release output logs to numerous output targets. Log4j is an integral part of Apache Logging Services, which cybercriminals can use to launch RCE attacks due to a vulnerability. The Log4j bug has sent shockwav...
- 1
-
Overview of Security Content and Intelligence The security intelligence is hosted at our content repository feeding the Saner platform. INDEX Security Content Statistics OVAL Definitions Platform Coverage OVAL Definitions Class-wise Distribution OVAL Definitions Family-wise Distribution Application and OS Remediation Coverage Comp...The security intelligence is hosted at our content repository feeding the Saner platform. INDEX Security Content Statistics OVAL Definitions Platform Coverage OVAL Definitions Class-wise Distribution OVAL Definitions Family-wise Distribution Application and OS Remediation Coverage Comp...
- 1
-
Viewing 4 topics - 1 through 4 (of 4 total)
- You must be logged in to create new topics.