Top 5 Application Vulnerabilities / IPS Distribution Rank - Name - % 1. ThinkPHP.Controller.Parameter.Remote.Code.Execution - 25% 2. PHPUnit.Eval-stdin.PHP.Remote.Code.Execution - 21% 3. NETGEAR.DGN1000.CGI.Unauthenticated.Remote.Code.Execution - 19% 4. Telerik.Web.UI.RadAsyncUpload.Handling.Arbitrary.File.Upload - 19% 5. Dasan.GPON.Remote.Code.Execution - 16% Top 5…
The CRA has locked down 800,000 online taxpayer accounts following an internal investigation that found user logins and other sensitive…
The first dominos to fall in the massive Microsoft breach (see above) will be government entities in the US and…
Microsoft recently reported that suspected Chinese nation-state actors have exploited a flaw in Exchange that has given them access to…
Four (4) zero-day vulnerabilities in Microsoft Exchange Server are being actively exploited by Hafnium, which the State Department believes is…
Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…
Spotify has returned for another appearance with a credential stuffing disaster eerily similar. This time, data of approximately 100k users…
The UK Research and Innovation (UKRI) agency is now researching a ransomware incident that encrypted data and impacted its proprietary…
Nissan North America recently suffered a data breach that resulted in source code for its mobile apps and internal tools…
Serverless computing is a misnomer. Computing is impossible without the presence of a machine. Just like a virus needs a host, code…