Resource Center
Welcome to our cybersecurity resource center where we uncover how malicious actors exploit weaknesses in systems, while going beyond the technical aspects and examining real-world perspectives across various industries.
Subscribe to AlertsCategory:
Tags:
January 24, 2024 | Blogs
On 22 January, Fortra issued an advisory stating that versions of its GoAnywhere Managed File Transfer (MFT) product suffer from…January 24, 2024 | Whitepapers
The Exploitable Attack Surface Keeps Expanding: Discover and Remediate Exploitable Vulnerabilities with NodeZeroJanuary 23, 2024 | Blogs
On 16 January, Atlassian released a security advisory concerning CVE-2023-22527 that affects vulnerable out-of-date versions of Confluence Data Center and…January 23, 2024 | Attack Blogs
On January 22, 2024 Fortra posted a security advisory for their GoAnywhere MFT product. This advisory details an authentication bypass…January 23, 2024 | Customer Stories
Cyber protection is crucial for the transportation industry and the supply chain because it ensures the seamless flow of goods,…January 22, 2024 | Blogs
Two recent Ivanti CVEs are being actively exploited by suspected nation-state threat actors.January 17, 2024 | Whitepapers
Manufacturers face an unprecedented array of challenges, from fierce competition to rapid technological advancements. Amid these shifts, ransomware threats have…January 17, 2024 | Whitepapers
Healthcare organizations recognize they need a preemptive approach to help them discover their truly exploitable vulnerabilities, show them how to…January 12, 2024 | Attack Blogs, Disclosures
Mirth Connect, by NextGen HealthCare, is an open source data integration platform widely used by healthcare companies. Versions prior to…January 12, 2024 | Attack Blogs, Disclosures
Introduction Back in Aug. 2023 we released an advisory for CVE-2023-39143, a critical vulnerability that affects Windows installs of the…