In: Information Security
We cover information security news and tutorials. Learn all about cyber security with the help of articles written by experts in cyber security and information security.
Protect your networks: Authentication bypass vulnerability in Zyxel firewalls
Zyxel security teams have fixed a dangerous vulnerability recently detected in some of its firewall solutions, recommending its customers to…
VMware vCenter Server is affected by dangerous information disclosure vulnerability: Patch immediately
Information security specialists report the detection of a severe vulnerability in VMware vCenter Server, the centralized management utility for VMware…
Check if these 7 vulnerabilities affect your NETGEAR network products. 30 product models affected
Cybersecurity specialists report the detection of multiple vulnerabilities in NETGEAR network products. According to the report, successful exploitation of the…
4 critical vulnerabilities patched in Apache HTTP Server
The detection of at least four vulnerabilities in Apache HTTP Server has been confirmed. According to information security specialists, the…
Important cryptographic vulnerability in Palo Alto PAN-OS
The detection of a severe vulnerability in PAN-OS, the operating system present in the solutions of the technological firm Palo…
Critical input validation and authentication vulnerabilities in Fortinet FortiMail
Two security vulnerabilities have been detected in FortiMail, the solution for the protection of enterprise email infrastructure developed by Fortinet….
Critical command injection vulnerability affects nearly 100 Hikvision CCTV products. Update immediately if you use any of these solutions
A critical vulnerability has been reported in multiple products from Hikvision, a Chinese state-controlled manufacturer and supplier of civilian and…
Important privilege escalation vulnerability in TP-Link TL-WA850RE routers
Cybersecurity specialists report the detection of a severe vulnerability in the line of TL-WA850RE V6 routers, developed by the technology…
Critical SQL and XSS injection vulnerabilities in phpUploader
Cybersecurity specialists report the detection of two critical vulnerabilities in phpUploader whose exploitation could result in the deployment of dangerous…
Severe security flaws in Schneider Electric IGSS Data Server
Cybersecurity specialists report the detection of multiple vulnerabilities in IGSS Data Server, one of the most important solutions of the…