Aggregator
CVE-2008-5749 | Google Chrome 1.0.154.36 code injection (EDB-7566 / BID-32997)
CVE-2008-5750 | Microsoft Internet Explorer 8 Beta 2 code injection (EDB-7566 / BID-32999)
CVE-2008-6920 | W2b phpEmployment 1.8 File Upload auth.php access control (EDB-7563 / XFDB-47592)
CVE-2008-6921 | W2b phpAdBoard 1.8 File Upload index.php access control (EDB-7562 / XFDB-47593)
CVE-2008-6897 | Andres Garcia Getleft 1.2 Getleft.exe memory corruption (EDB-7564 / XFDB-47597)
CVE-2015-6988 | Apple iOS up to 9.0 Kernel memory corruption (HT205370 / Nessus ID 86654)
CVE-2015-6988 | Apple Mac OS X up to 10.11.0 Kernel uninitialized resource (HT205375 / Nessus ID 86654)
CVE-2015-6974 | Apple Mac OS X up to 10.11.0 IOHIDFamily memory corruption (HT205375 / Nessus ID 86654)
CVE-2015-5932 | Apple Mac OS X up to 10.11.0 Kernel type confusion (HT205375 / Nessus ID 86654)
CVE-2015-6974 | Apple iOS up to 9.0 IOHIDFamily memory corruption (HT205370 / Nessus ID 86654)
SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024
SquareX, the leading browser security company, will make its Australian debut at Melbourne CyberCon 2024, hosted by AISA (Australian Information Security Association), from 26th to 28th November 2024. SquareX will showcase its groundbreaking Browser Detection and Response (BDR) solution at StartUp Booth 42, addressing the growing risk of browser-based cyber threats targeting employees. With the […]
The post SquareX Brings Industry’s First Browser Detection Response Solution to AISA Melbourne CyberCon 2024 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-38812 | VMware vCenter Server/Cloud Foundation DCERPC Protocol heap-based overflow
CVE-2024-38813 | VMware vCenter Server/Cloud Foundation dropped privileges
Akira
Akira
Akira
Build Confidence with Robust Machine Identity Solutions
How Robust Are Your Machine Identity Solutions? As cybersecurity threats and data breaches continue to soar, the question becomes inevitable: how robust are your machine identity solutions? For many organizations, the answer remains shrouded in ambiguity, leaving them vulnerable to data breaches and non-compliance penalties. However, a new frontier of Non-Human Identity (NHI) and Secrets […]
The post Build Confidence with Robust Machine Identity Solutions appeared first on Entro.
The post Build Confidence with Robust Machine Identity Solutions appeared first on Security Boulevard.