Aggregator
CVE-2024-13308 | Drupal Browser Back Button up to 2.0.1 cross site scripting
CVE-2024-13309 | Drupal Login Disable up to 2.1.0 improper authentication
CVE-2024-54157 | JetBrains YouTrack up to 2024.3.47707 Ruby Syntax Detector redos (Nessus ID 212125)
DeepSeek database exposed highly sensitive information
CVE-2012-6589 | Myrephp MYRE Business Directory search.php look cross site scripting (EDB-22711)
Healthcare Sector Charts 2 More Ransomware Attacks
CVE-2010-4749 | BLOG:CMS 4.2.1.e action.php body cross site scripting (EDB-15743 / OSVDB-70115)
CVE-2015-6517 | phpLiteAdmin 1.1 phpliteadmin.php droptable cross-site request forgery (ID 132580 / EDB-37515)
CVE-2010-4750 | BLOG:CMS 4.2.1.e action.php body cross-site request forgery (EDB-15743 / OSVDB-70115)
2025 predictions: Security industry
The pace of change in the technology industry has never been faster, and 2025 will be no exception. As businesses adapt to new threats, regulatory pressures, and AI-driven innovations, security and software development teams will need to rethink their strategies to stay ahead.
The post 2025 predictions: Security industry appeared first on Security Boulevard.
Preparing for PCI DSS 4.0: How Sonatype SBOM Manager can streamline and accelerate your transition
Payment Card Industry Data Security Standard (PCI DSS) was developed to strengthen payment account data security and standardize globally the necessary security controls. The transition from PCI DSS 3.2.1 and earlier versions to v4.0 involves significant changes aimed at enhancing payment security, providing flexibility in implementation, and addressing emerging threats.
The post Preparing for PCI DSS 4.0: How Sonatype SBOM Manager can streamline and accelerate your transition appeared first on Security Boulevard.
CVE-2022-41400 | Sage 300 up to 2022 hard-coded key
CVE-2023-27971 | HP LaserJet Pro buffer overflow
CVE-2023-30455 | ebankIT 6 GET Parameter DownloadEStatement.ashx EStatementsIds denial of service (ID 172064)
CVE-2023-24269 | Textpattern 4.8.8 ZIP File unrestricted upload
CVE-2018-2698 | Oracle VM VirtualBox access control (EDB-43878 / Nessus ID 106289)
Play
Trust in Cloud Security with Effective Secrets Rotation
How Critical is Secrets Rotation in Building Trust in Cloud Security? Are you aware that proper management of Non-Human Identities (NHIs) and Secrets is a cornerstone of robust cloud security? Indeed, incorporating effective secrets rotation in your cybersecurity strategy leads to far-reaching control, considerably reducing the risk of security breaches and data leaks. But, how […]
The post Trust in Cloud Security with Effective Secrets Rotation appeared first on Entro.
The post Trust in Cloud Security with Effective Secrets Rotation appeared first on Security Boulevard.
Innovative PAM Strategies for Modern Enterprises
How Essential are Innovative PAM Strategies for Modern Enterprises? Where technology advances at an unprecedented rate, a question emerges for modern businesses: How pivotal are innovative Privileged Access Management (PAM) strategies for your enterprise’s security? With the rise of cloud-based technologies and automated systems, the anatomy of cyber threats is also evolving. The introduction of […]
The post Innovative PAM Strategies for Modern Enterprises appeared first on Entro.
The post Innovative PAM Strategies for Modern Enterprises appeared first on Security Boulevard.