X

Vous n'êtes pas connecté

Maroc Maroc - THECYBERTHRONE.IN - A La Une - 25/01/2025 01:25

PANdora Box Vulnerabilities in PaloAlto Firewalls

Overview of PANdora’s Box PANdora’s Box is a term used to describe a series of critical vulnerabilities identified in various models of Palo Alto Networks’ firewalls. These vulnerabilities have significant security implications, potentially allowing attackers to bypass security features, execute arbitrary code, and compromise the affected systems. The discovery was made by security researchers from […]

Articles similaires

Sorry! Image not available at this time

Multiple Vulnerabilities in TP-Link Devices Enable Arbitrary Command Execution

itsecuritynews.info - 24/Mar 11:12

TP-Link recently published a critical security advisory addressing four high-severity vulnerabilities in its Archer series routers. The flaws impact...

Sorry! Image not available at this time

FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion

itsecuritynews.info - 18/Mar 06:09

Cybersecurity researchers have a detailed a critical security flaw in Fortinet’s FortiClient Enterprise Management Server (EMS). Tracked as...

Sorry! Image not available at this time

FortiClient Hit by Severe SQL Injection Vulnerability Enabling Database Intrusion

itsecuritynews.info - 18/Mar 06:09

Cybersecurity researchers have a detailed a critical security flaw in Fortinet’s FortiClient Enterprise Management Server (EMS). Tracked as...

Sorry! Image not available at this time

Patch now: TP-Link Archer NX routers vulnerable to firmware takeover

securityaffairs.co - 25/Mar 14:44

TP-Link patched a high severity flaw (CVE-2025-15517) in Archer NX routers that could let attackers bypass authentication and install malicious...

Sorry! Image not available at this time

BIND 9 Security Flaws Allow Attackers to Bypass Security Controls and Crash Servers

itsecuritynews.info - 12:32

The Internet Systems Consortium (ISC) has released critical security advisories addressing three new vulnerabilities in the widely used BIND 9 Domain...

Sorry! Image not available at this time

Study finds AI privacy leaks hinge on a few high-impact neural network weights

techxplore.com - 24/Mar 16:00

Researchers have discovered that some of the elements of AI neural networks that contribute to data-privacy vulnerabilities are also key to the...

Sorry! Image not available at this time

FortiGate Firewalls Exploited in Wave of Attacks to Breach Networks and Steal Credentials

itsecuritynews.info - 15/Mar 04:11

A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls (NGFW) to establish persistent footholds...

Sorry! Image not available at this time

FortiGate Firewalls Exploited in Wave of Attacks to Breach Networks and Steal Credentials

itsecuritynews.info - 15/Mar 04:11

A series of intrusions in early 2026 in which threat actors compromised FortiGate Next-Generation Firewalls (NGFW) to establish persistent footholds...

Sorry! Image not available at this time

Veeam Patches Multiple Critical RCE Vulnerabilities on Backup Server

itsecuritynews.info - 13/Mar 10:32

A critical security update has been released for Backup & Replication software to fix severe vulnerabilities that could allow attackers to execute...

Sorry! Image not available at this time

Patch now: TP-Link Archer NX routers vulnerable to firmware takeover

itsecuritynews.info - 25/Mar 16:07

TP-Link patched a high severity flaw (CVE-2025-15517) in Archer NX routers that could let attackers bypass authentication and install malicious...