Ghostscript Vulnerability Actively Exploited in the Wild
A severe remote code execution (RCE) vulnerability in the widely used Ghostscript library is being actively exploited. This vulnerability, identified…
A severe remote code execution (RCE) vulnerability in the widely used Ghostscript library is being actively exploited. This vulnerability, identified…
Juniper Networks has issued an out-of-band security update to address a critical flaw that poses a significant security risk to…
Linux users beware! OpenSSH flaw, a networking utility installed on every Unix and Linux system by default, is affected by…
Vulnerabilities and exploits are strange bedfellows. While vulnerabilities are unintended and often unavoidable, exploits are deliberately created to feast on…
A stunning silence had erupted in a national bank. My brother, our finance person, and I sat in their office.…
Attack surface reduction is the single most important step to secure your organization from cyberattacks. But it can be lengthy,…
In recent times, there’s been a huge buzz about the increasing popularity of Continuous Threat and Exposure Management (CTEM). With…
In today’s world, trust is not taken for granted. Similarly, imagine a security model that questions every interaction, ensuring nothing…
In this episode of “Story behind a cyberattack”, let’s talk about a cyberattack that shook the cybersecurity landscape in 2021.…
A critical security vulnerability in Progress Software’s MOVEit Transfer has been discovered and is known to be under active exploitation.…