-
Fortinet publishes an opinion on the new post-exploitation technique for known vulnerabilities
Fortinet is aware of a threat actor creating a malicious file from previously exploited Fortinet vulnerabilities (CVE-2024-21762, CVE-2023-27997 and CVE-2022-42475) in Fortigate products. This malicious file could allow read -free…
-
Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution
MS-ISAC ADVISORY NUMBER: 2025-039 DATE(S) ISSUED: 04/08/2025 OVERVIEW: Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution. Adobe Commerce is…
-
Fast Flux: A National Security Threat
Executive summary Many networks have a gap in their defenses for detecting and blocking a malicious technique known as fast flux. This technique poses a significant threat to national security,…
-
Cisa publishes a malware analysis report on malware resurgeted associated with Ivanti Connect Secure
Cisa has published a malware analysis report (MAR) with associated detection analysis and signatures on a new variant of malware CISA has identified as a land. Resurge contains capabilities of…
-
Vulnerability in Google Chrome could allow an arbitrary code execution
MS-ISAC consultancy number: 2025-031 Published date (s): 03/26/2025 PREVIEW: A vulnerability has been discovered in Google Chrome, which could allow arbitrary Code execution. Successful exploitation of this vulnerability could allow…
-
CISA publishes five advice from industrial control systems
The CISA published five opinions on industrial control systems (ICS) on March 20, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. Cisa…
-
MS -Isac Cybersecurity Advisory – Several vulnerabilities in the PACS health server could allow the execution of the code remote – Patch now
MS-ISAC consultancy number: 2025-026 Published date (s): 03/14/2025 PREVIEW: Several vulnerabilities have been discovered in Sante Pacs Server, the most serious of which could allow the execution of remote code.…
-
#StopRansomware: Medusa Ransomware | CISA
Summary Note: This joint Cybersecurity Advisory is part of an ongoing #StopRansomware effort to publish advisories for network defenders detailing various ransomware variants and ransomware threat actors. These #StopRansomware advisories…
-
Cisa publishes three reviews of industrial control systems
The CISA published three reviews of industrial control systems (ICS) on March 6, 2025. These opinions provide timely information on current security problems, vulnerabilities and exploits surrounding integrated circuits. Cisa…
Search
Recent Posts
- How to Align AI Initiatives with Cybersecurity Policies in 2025
- Vulnerability in Microsoft Windows Server Update Services (WSUS) could allow remote code execution
- Several vulnerabilities in Ivanti products could allow remote code execution
- Several vulnerabilities in Aria VMware operations and VMware tools could allow a climbing of privileges














