Skip to content
Cybervizer Logo
  • Top 5 Ranked Global Influencer
    • About Mark Lynd
  • Cyber News
    • Cybersecurity
    • Cyber Crime
    • Data Breach
    • Malware
    • Cyber Warfare
    • Privacy
    • Vulnerabilities
  • Blog
  • Contact
  • Sign in / Join
  • Top 5 Ranked Global Influencer
    • About Mark Lynd
  • Cyber News
    • Cybersecurity
    • Cyber Crime
    • Data Breach
    • Malware
    • Cyber Warfare
    • Privacy
    • Vulnerabilities
  • Blog
  • Contact
  • Sign in / Join

Vulnerabilities

Home » Vulnerabilities » Page 2
Read more about the article Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities

Hackers Actively Exploiting Cisco AnyConnect and GIGABYTE Drivers Vulnerabilities

Cisco has warned of active exploitation attempts targeting a pair of two-year-old security flaws in…

Read more about the article Several Flaws Affect the Juniper Junos OS

Several Flaws Affect the Juniper Junos OS

Multiple high-severity security flaws in Juniper Networks devices have been discovered. The most serious is…

Read more about the article Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug

Fortinet Warns of Active Exploitation of Newly Discovered Critical Auth Bypass Bug

Fortinet on Monday revealed that the newly patched critical security vulnerability impacting its firewall and…

Read more about the article Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware

Multiple Campaigns Exploit VMware Vulnerability to Deploy Crypto Miners and Ransomware

A now-patched vulnerability in VMware Workspace ONE Access has been observed being exploited to deliver…

Read more about the article Apple Releases Patch for New Actively Exploited iOS and iPadOS Zero-Day Vulnerability

Apple Releases Patch for New Actively Exploited iOS and iPadOS Zero-Day Vulnerability

Tech giant Apple on Monday rolled out updates to remediate a zero-day flaw in iOS…

Read more about the article 22-Year-Old Vulnerability Reported in Widely Used SQLite Database Library

22-Year-Old Vulnerability Reported in Widely Used SQLite Database Library

A high-severity vulnerability has been disclosed in the SQLite database library, which was introduced as…

Read more about the article State-Sponsored Hackers Likely Exploited MS Exchange 0-Days Against ~10 Organizations

State-Sponsored Hackers Likely Exploited MS Exchange 0-Days Against ~10 Organizations

Microsoft on Friday disclosed that a single activity group in August 2022 achieved initial access…

Read more about the article Researchers Say Microsoft Office 365 Uses Broken Email Encryption to Secure Messages

Researchers Say Microsoft Office 365 Uses Broken Email Encryption to Secure Messages

New research study has actually revealed what's being called a security vulnerability in Microsoft 365…

Read more about the article Rapid7 Researchers are Closely Monitoring Critical Bug in Apache Commons Text

Rapid7 Researchers are Closely Monitoring Critical Bug in Apache Commons Text

A remote code execution vulnerability in the Apache Commons Text library has sparked comparisons with…

Read more about the article Vital RCE Vulnerability Found in Popular Cobalt Strike Hacking Software Application

Vital RCE Vulnerability Found in Popular Cobalt Strike Hacking Software Application

HelpSystems, the business behind the Cobalt Strike software application platform, has actually launched an out-of-band…

  • Go to the previous page
  • 1
  • 2
  • 3
  • 4
  • 5
  • …
  • 9
  • Go to the next page

Follow Me


Sign Up for Our Morning Boot Cybersecurity Newsletter


Sponsored Ad

Cybervizer Recommended Book

Recent posts

  • Businesses Need to Ramp Up Their Security to Counter Future Attacks December 23, 2022
  • Cyberattack Targets US Hospital in Texas December 23, 2022
  • A Huge DDoS Network was Taken Down by the US DOJ December 23, 2022
Twitter Youtube Instagram Linkedin Pinterest Rss

© Copyright 2021 – Relevant Track, LLC.

  • About
  • Privacy Policy
  • Terms of Use
  • Contact
  • About
  • Privacy Policy
  • Terms of Use
  • Contact

Log in

Become a part of our community!
Forgot your password? Get help

Reset password

Recover your password
A password reset link will be e-mailed to you.
Back to
Login
×

By continuing to use this website, you consent to the use of cookies in accordance with our Cookie Policy.

Accept