Saturday, December 7, 2019

Vulnerabilities Found in Aviatrix Enterprise VPN

Two local privilege escalation vulnerabilities have been identified by a researcher in an enterprise VPN product from cloud-native networking solutions provider Aviatrix. Aviatrix claims to...

Facebook Sues Chinese Company Over Ad Fraud

Facebook on Thursday filed suit in California against one organization and two individuals for engaging in ad fraud on the social media platform. The defendants,...

OpenBSD Fixes Authentication Bypass Flaw and Other Severe Bugs

Multiple bugs were reported in the Unix-like open-source operating system, OpenBSD.Out of these, the most critical one was the authentication bypass vulnerability that was...

Panorays Raises $15 Million in Series A Funding Round

Automated third-party security lifecycle management provider Panorays this week announced it raised $15 million as part of a Series A funding round. The funding, the...

Weidmueller Patches Critical Vulnerabilities in Industrial Switches

Germany-based industrial connectivity solutions provider Weidmueller has released firmware updates for many of its managed industrial Ethernet switches to address critical vulnerabilities. Weidmueller has six...

U.S. Authorities Take Action Against 600 Money Mules

Authorities in the United States recently stopped the activities of more than 600 domestic money mules, the Department of Justice announced on Wednesday. Money mules...

Major U.S. Data Center Provider Hit by Ransomware Attack

Major U.S. data center provider CyrusOne, hit by Sodinokibi ransomware, impacts six of their managed service customers. The Sodinokibi ransomware was first identified on...

Stay connected

25,000FansLike
5,444FollowersFollow
1,020SubscribersSubscribe

Latest article

9 FileHippo Alternative – TechShout

An ideal FileHippo alternative should boast of hoarding a wide variety of software bits. It should be your one stop shop for acquiring all...

Vigil@nce vulnerability – TeamPass: Cross Site Scripting via Search Page

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them....

How Are Cyber Attacks Evolving?

In short, Gen V and Gen VI cyber attacks differ from previous cyber attack generations because these are multi-vector and polymorphic attacks. For example,...