Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Vulnerability

Find and Remediate PAN-OS Vulnerabilities in Seconds with Forward Enterprise

The vulnerabilities CVE-2024-0012 and CVE-2024-9474 exploit weaknesses in the PAN-OS management interface, allowing attackers to bypass authentication and escalate privileges, potentially resulting in unauthorized control over network devices. Addressing these vulnerabilities quickly and effectively is critical to maintaining security and compliance.

Exploitability in APIs: Patterns and Risks Uncovered #APIExploit #SecurityTools #APISecurity

APIs are integral to modern technology but are often highly vulnerable. In this video, we discuss: The significance of a 7.5 CVSS score for common API vulnerabilities. How API design, aimed at accessibility, increases exploitability. Key patterns identified in over 200 API issues analyzed quarterly. Why securing your APIs is essential, no matter the risk level.

Exploited! NuPoint Unified Messaging (NPM) Component of Mitel MiCollab

The NuPoint Unified Messaging (NPM) module in Mitel MiCollab versions up to 9.8 SP1 FP2 (9.8.1.201) is vulnerable to a path traversal attack caused by insufficient input validation. This vulnerability could be exploited by an unauthenticated attacker to gain unauthorized access to sensitive files, potentially allowing them to read, alter, or delete user data and critical system settings. The Mitel MiCollab Arbitrary File Read Vulnerability combines CVE-2024-41713 with another yet-to-be-assigned issue.

Machine Learning Bug Bonanza - Exploiting ML Clients and "Safe" Model Formats

In our previous blog post in this series we showed how the immaturity of the Machine Learning (ML) field allowed our team to discover and disclose 22 unique software vulnerabilities in ML-related projects, and we analyzed some of these vulnerabilities that allowed attackers to exploit various ML services.

How Calico Vulnerability Management Works

In the ever-evolving Kubernetes landscape, security remains a paramount concern. Ensuring that your containers are free from vulnerabilities is crucial for maintaining the integrity and performance of your applications. This is where Calico Vulnerability Management steps in, offering a comprehensive solution designed to keep your Kubernetes environment secure from potential threats.

Avoiding Pitfalls in Vulnerability Management: Key Insights and Best Practices

Vulnerability management (VM) has always been a complex area of concern that requires continuous and active effort to work properly. This can make it challenging for organizations to maintain their VM strategies and solutions over time, as there are many angles to secure and processes to oversee. There are a wide range of potential ways that VM can go wrong, and it is essential for organizations to avoid the many pitfalls associated with it.