-
Several vulnerabilities in Citrix products could allow the disclosure of sensitive data
MS-ISAC consultancy number: 2025-060 Published date (s): 06/27/2025 PREVIEW: Several vulnerabilities have been discovered in Citrix products, the most serious of which could allow the disclosure of sensitive data. CITRIX…
-
CISA publishes five advice from industrial control systems
The CISA published five opinions on industrial control systems (ICS) on June 17, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. Cisa…
-
Ransomware actors use unrefined surveillance and remote management to compromise the provider of public services billing software
Summary The Cybersecurity and Infrastructure Safety Agency (CISA) publishes this advice in response to ransomware players by taking advantage of unrealized bodies of vulnerability in the surveillance and remote management…
-
Several vulnerabilities in Adobe products could allow an arbitrary code execution
Several vulnerabilities have been discovered in Adobe products, the most serious of which could allow arbitrary code execution. Details of these vulnerabilities are as follows Tactical: Execution (TA0002)) Technical: Operation…
-
Cisa publishes four reviews of industrial control systems
The CISA published four reviews on industrial control systems (ICS) on June 10, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. Cisa…
-
Several vulnerabilities in the HPE Storeonce software could allow the execution of remote code
MS-ISAC consultancy number: 2025-054 Published date (s): 04/06/2025 PREVIEW: Several vulnerabilities have been discovered in the Hpe Storeonce software, which, when chained, could allow a distant code execution, potentially leading…
-
CISA publishes five advice from industrial control systems
The CISA published five opinions on industrial control systems (ICS) on May 29, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. Cisa…
-
Threat Actors Deploy LummaC2 Malware to Exfiltrate Sensitive Data from Organizations
Summary The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) are releasing this joint advisory to disseminate known tactics, techniques, and procedures (TTPs) and indicators…
-
Vulnerability in Google Chrome could allow an arbitrary code execution
MS-ISAC consultancy number: 2025-052 Published date (s): 05/15/2025 PREVIEW: Vulnerability has been discovered in Google Chrome which could allow an arbitrary Code execution. The successful exploitation of this vulnerability could…
Search
Recent Posts
- A vulnerability in the WatchGuard Fireware operating system could allow arbitrary code execution.
- Vulnerability in Cisco AsyncOS Could Allow Remote Code Execution
- Vulnerability in SonicOS could allow denial of service (DoS)
- Several vulnerabilities in Google Chrome could allow arbitrary code execution














