About | Contact | Privacy Policy | Terms of Use | Disclaimer

cyber_insider_logo
  • Home
  • AI Governance & Security
  • Cybersecurity & Risk
  • Guides & Frameworks
  • Compliance & Policy
  • Insights

Author: Nabil Anine

  • 15
    Jan
    Insights

    Nabil Anine

    Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

    Threat Actors Chained Vulnerabilities in Ivanti Cloud Service Applications

    Note: The CVEs in this advisory are unrelated to vulnerabilities (CVE-2025-0282 and CVE-2025-0283) in Ivantis Connect Secure, Policy Secure and ZTA Gateways. For more information on mitigating CVE -2025-0282 and CVE-2025-0283,…

    Continue Reading

  • 9
    Jan
    Insights

    Nabil Anine

    Several vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication.

    Several vulnerabilities in SonicWall SonicOS could allow a remote attacker to bypass authentication.

    MS-ISAC NOTICE NUMBER: 2025-002 ISSUE DATE(S): 09/01/2025 PREVIEW: Several vulnerabilities have been discovered in SonicWall SonicOS that could allow authentication to be bypassed. SonicOS is SonicWalls' operating system designed for…

    Continue Reading

  • 7
    Jan
    Insights

    Nabil Anine

    CISA adds three known exploited vulnerabilities to its catalog

    CISA adds three known exploited vulnerabilities to its catalog

    CISA has added three new vulnerabilities to its catalog of known exploited vulnerabilities, based on evidence of active exploitation. CVE-2024-41713 Mitel MiCollab Path Traversal Vulnerability CVE-2024-55550 Mitel MiCollab Path Traversal…

    Continue Reading

  • 30
    Dec
    Insights

    Nabil Anine

    CISA adds known exploited vulnerability to its catalog

    CISA adds known exploited vulnerability to its catalog

    CISA has added a new vulnerability to its catalog of known exploited vulnerabilities, based on evidence of active exploitation. CVE-2024-3393 Palo Alto Networks PAN-OS Malformed DNS Packet Vulnerability These types…

    Continue Reading

  • 23
    Dec
    Insights

    Nabil Anine

    Vulnerability in Apache Struts2 could allow remote code execution

    Vulnerability in Apache Struts2 could allow remote code execution

    MS-ISAC NOTICE NUMBER: 2024-141 ISSUE DATE(S): 12/23/2024 PREVIEW: A vulnerability has been discovered in Apache Struts2, which could allow remote code execution. Apache Struts2 is an open source web application…

    Continue Reading

  • 20
    Dec
    Insights

    Nabil Anine

    Fortinet releases security updates for FortiManager

    Fortinet releases security updates for FortiManager

    Fortinet has released a security update to address a vulnerability in FortiManager. A remote cyber threat actor could exploit this vulnerability to take control of an affected system. Users and…

    Continue Reading

  • 20
    Dec
    Insights

    Nabil Anine

    Multiple vulnerabilities in Sophos Firewall could allow remote code execution

    Multiple vulnerabilities in Sophos Firewall could allow remote code execution

    MS-ISAC NOTICE NUMBER: 2024-140 ISSUE DATE(S): 12/19/2024 PREVIEW: Several vulnerabilities have been discovered in Sophos Firewall, the most serious of which could allow remote code execution. Sophos Firewall is a…

    Continue Reading

  • 12
    Dec
    Insights

    Nabil Anine

    Vulnerability in several Cleo products could allow remote code execution

    Vulnerability in several Cleo products could allow remote code execution

    MS-ISAC NOTICE NUMBER: 2024-139 ISSUE DATE(S): 12/12/2024 PREVIEW: A vulnerability has been discovered in several Cleo products that could allow remote code execution. Cleos LexiCom, VLTransfer and Harmony are commonly…

    Continue Reading

  • 10
    Dec
    Insights

    Nabil Anine

    CISA adds known exploited vulnerability to its catalog

    CISA adds known exploited vulnerability to its catalog

    CISA has added a new vulnerability to its catalog of known exploited vulnerabilities, based on evidence of active exploitation. CVE-2024-49138 Microsoft Windows Common Log File System (CLFS) Driver Heap-Based Buffer…

    Continue Reading

Previous Page
1 … 6 7 8 9 10 … 29
Next Page

Search

Connect with us

  • Facebook
  • Instagram
  • LinkedIn
  • YouTube
  • X

Recent Posts

  • A vulnerability in the WatchGuard Fireware operating system could allow arbitrary code execution.
    A vulnerability in the WatchGuard Fireware operating system could allow arbitrary code execution.
  • Vulnerability in Cisco AsyncOS Could Allow Remote Code Execution
    Vulnerability in Cisco AsyncOS Could Allow Remote Code Execution
  • Vulnerability in SonicOS could allow denial of service (DoS)
    Vulnerability in SonicOS could allow denial of service (DoS)
  • Several vulnerabilities in Google Chrome could allow arbitrary code execution
    Several vulnerabilities in Google Chrome could allow arbitrary code execution

Categories

  • AI Governance & Security
  • Compliance & Policy
  • Cybersecurity & Risk
  • Guides & Frameworks
  • Insights
  • Uncategorized
cyber_insider_logo

Cyber Insider empowers leaders to navigate Responsible AI, Cybersecurity Governance, and Compliance with clarity.

Connect

LinkedIn

Contact Us

About

Contact@Cyberinsider.ca

Quick Links
  • Home
  • AI Governance & Security
  • Cybersecurity & Risk
  • Guides & Frameworks
  • Compliance & Policy
  • Insights
Resources
  • NIST AI RMF Guide
  • ISO 42001 Overview
  • AIDA (Bill C-27) Summary
  • Templates & Checklists
  • Newsletter Signup
  • Facebook
  • X
  • Dribbble
  • YouTube
  • Instagram

Cyber Insider – All Rights Reserved.

Privacy Policy

Term of Use

Disclaimer

.
  • Home
  • Guides & Frameworks
  • Insights
  • About
  • Contact