Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
February 5, 2024 | Blogs
On 22 January, Ivanti published an advisory stating that they discovered two new, high-severity vulnerabilities (CVE-2024-21888 and CVE-2024-21893) after researching…February 5, 2024 | Blogs
“Who cares that the intern was phished during our phishing campaign? It’s an intern, they don't have access to anything…January 30, 2024 | Blogs
On 24 January 2024, the Jenkins team issued a security advisory disclosing a critical vulnerability that affects the Jenkins CI/CD…January 29, 2024 | Attack Blogs
CVE-2024-23897: Assessing the Impact of the Jenkins Arbitrary File Leak Vulnerability.January 24, 2024 | Blogs
On 22 January, Fortra issued an advisory stating that versions of its GoAnywhere Managed File Transfer (MFT) product suffer from…January 24, 2024 | Whitepapers
The Exploitable Attack Surface Keeps Expanding: Discover and Remediate Exploitable Vulnerabilities with NodeZeroJanuary 23, 2024 | Blogs
On 16 January, Atlassian released a security advisory concerning CVE-2023-22527 that affects vulnerable out-of-date versions of Confluence Data Center and…January 23, 2024 | Attack Blogs
On January 22, 2024 Fortra posted a security advisory for their GoAnywhere MFT product. This advisory details an authentication bypass…January 23, 2024 | Customer Stories
Cyber protection is crucial for the transportation industry and the supply chain because it ensures the seamless flow of goods,…January 22, 2024 | Blogs
Two recent Ivanti CVEs are being actively exploited by suspected nation-state threat actors.