#vulnerabilities نتائج البحث

When #Vulnerabilities Pile Up - Finding the Real Value in #Security #Assessments Every year, a familiar pattern emerges. An organization invests in #penetration #testing. The report comes back. Dozens, sometimes hundreds, of findings. Fast forward 12 months... the same…

logisekict's tweet image. When #Vulnerabilities Pile Up - Finding the Real Value in #Security #Assessments

Every year, a familiar pattern emerges. An organization invests in #penetration #testing. The report comes back. Dozens, sometimes hundreds, of findings.

Fast forward 12 months... the same…

⚠️ CVE-2025-7775 🖥️ Citrix NetScaler ADC/Gateway memory overflow 💬 allows unauthenticated remote code execution on vulnerable NetScaler appliances, enabling full system takeover and lateral movement 🔗 cve.mitre.org/cgi-bin/cvenam… #ransomNews #vulnerabilities #security #CVE

ransomnews's tweet image. ⚠️ CVE-2025-7775
🖥️ Citrix NetScaler ADC/Gateway memory overflow
💬 allows unauthenticated remote code execution on vulnerable NetScaler appliances, enabling full system takeover and lateral movement

🔗 cve.mitre.org/cgi-bin/cvenam…

#ransomNews #vulnerabilities #security #CVE

⚠️ Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk Read more: cybersecuritynews.com/ivanti-endpoin… #cybersecuritynews #vulnerabilities #ivanti

gbhackers_news's tweet image. ⚠️ Ivanti Endpoint Manager Vulnerabilities Let Attackers Write Arbitrary Files to Disk

Read more: cybersecuritynews.com/ivanti-endpoin…

#cybersecuritynews #vulnerabilities #ivanti

Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies

PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies

⚠️ Atenție! Mai multe vulnerabilități critice afectează Google Chrome și alte browsere bazate pe Chromium. 👉 Citește avertizarea completă pe site-ul DNSC: dnsc.ro/citeste/averti… #DNSC #CyberSecurity #Vulnerabilities #UpdateNow #SigurantaOnline

DNSC_RO's tweet image. ⚠️ Atenție! Mai multe vulnerabilități critice afectează Google Chrome și alte browsere bazate pe Chromium.

👉 Citește avertizarea completă pe site-ul DNSC: dnsc.ro/citeste/averti…

#DNSC #CyberSecurity #Vulnerabilities #UpdateNow #SigurantaOnline

A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. Get the full story ➡️ bit.ly/45R1ogq #cybersecurity

onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity
onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity
onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity

#Cyberattacks on manufacturing aren't just IT issues. They stop production, they threaten supply chains and they exploit wireless and IoT #vulnerabilities. Risk-based security, network segmentation, and strict access controls are now critical.❗mou.sr/3LGw0JU

MouserElecEU's tweet image. #Cyberattacks on manufacturing aren't just IT issues. They stop production, they threaten supply chains and they exploit wireless and IoT #vulnerabilities. 

Risk-based security, network segmentation, and strict access controls are now critical.❗mou.sr/3LGw0JU

The #Swagger You Forgot Is the Risk You Inherited Sometimes the biggest #vulnerabilities aren’t hidden behind layers of #obfuscation, they’re sitting in plain sight, waiting for someone curious enough to look. That’s exactly what happened during a recent grey-box web application…

logisekict's tweet image. The #Swagger You Forgot Is the Risk You Inherited

Sometimes the biggest #vulnerabilities aren’t hidden behind layers of #obfuscation, they’re sitting in plain sight, waiting for someone curious enough to look. That’s exactly what happened during a recent grey-box web application…

XXE #vulnerabilities happen when a misconfigured XML parser processes an XML input containing external entities. This exposure allows attackers to read local files or conduct SSRF attacks. Disable external entity processing in XML parsers and consider using JSON-based formats…

Qodana's tweet image. XXE #vulnerabilities happen when a misconfigured XML parser processes an XML input containing external entities. 

This exposure allows attackers to read local files or conduct SSRF attacks.

Disable external entity processing in XML parsers and consider using JSON-based formats…

From 2022 through 2024, APT28 exploited #vulnerabilities to remotely and wirelessly access data from a targeted company network. Our latest post presents vulnerabilities, exploitations, weaknesses, and how they might impact the wireless system - sei.cmu.edu/blog/radio-fre…


#Kubernetes: Newly disclosed #vulnerabilities in the #runC container runtime used in #Docker & Kubernetes (CVE-2025-31133, CVE-2025-52565, CVE-2025-52881) could be exploited to bypass isolation restrictions & get access to the host system (escape): #k8s bleepingcomputer.com/news/security/…


BitsLab’s AI Audit Agent Discovers Multiple Vulnerabilities in Story Protocol’s Smart Contracts @0xbitslab #AI #Vulnerabilities #Web3Security chainwire.org/2025/11/04/bit…


"Let’s draw attention to places where people can act." Tyler Reguly of Fortra weighs in on where CISOs should focus during May's Patch Tuesday. Read his full take via @CSOonline: hubs.la/Q03n7n4N0 #PatchTuesday #infosec #vulnerabilities

fortraofficial's tweet image. "Let’s draw attention to places where people can act." 
Tyler Reguly of Fortra weighs in on where CISOs should focus during May's Patch Tuesday. 

Read his full take via @CSOonline: hubs.la/Q03n7n4N0

#PatchTuesday #infosec #vulnerabilities

#PrecisionMedicine is IMPORTANT in #Lupus, but PERSONALIZED medicine, - taking into account the personal socio-economic determinants & patient #vulnerabilities-, is even MORE IMPORTANT. Check our latest PAPER with @G_O_Daniel & Zoe from @LupusEurope at: sciencedirect.com/science/articl…

Lupusreference's tweet image. ✅ #PrecisionMedicine is IMPORTANT in #Lupus, but PERSONALIZED medicine, - taking into account the personal socio-economic determinants & patient #vulnerabilities-, is even MORE IMPORTANT. Check our latest PAPER with @G_O_Daniel & Zoe from @LupusEurope at: sciencedirect.com/science/articl…

Recent updates to the Stakeholder-Specific #Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize #vulnerabilities according to their distinct risk appetites. Our latest post details the updates #CyberSecurityAwareness - sei.cmu.edu/blog/whats-new…

SEI_CMU's tweet image. Recent updates to the Stakeholder-Specific #Vulnerability Categorization (SSVC) framework help different stakeholders to prioritize #vulnerabilities according to their distinct risk appetites. Our latest post details the updates #CyberSecurityAwareness  - sei.cmu.edu/blog/whats-new…

Just picked up my holiday photos! 50% landscapes, 50% Grype being @GrypeProject 👽📷 #vulnerabilities #security #family

SyftProject's tweet image. Just picked up my holiday photos!
50% landscapes, 50% Grype being @GrypeProject 👽📷
#vulnerabilities #security #family
SyftProject's tweet image. Just picked up my holiday photos!
50% landscapes, 50% Grype being @GrypeProject 👽📷
#vulnerabilities #security #family

What the Phuzz, we're Back! Ever wonder how #zeroday #vulnerabilities in your favorite websites get uncovered? In this first one, Our guest is diving into a game-changing technique: Coverage-Guided #Fuzzing for #PHP Web Apps! Forget slow scanners; we're talking about finding…

NeeluTripathy's tweet card. S04EP01 | Teaser | What the PHUZZ! - Zero Day Playbook with Coverag...

youtube.com

YouTube

S04EP01 | Teaser | What the PHUZZ! - Zero Day Playbook with Coverag...


An anonymous security researcher has identified at least a dozen juror websites made by government software maker Tyler Technologies that can easily expose jurors' personal data. buff.ly/HfJEACc #Vulnerabilities #PrivacyBreach #DataBreach #Cybersecurity

KingslandTech's tweet image. An anonymous security researcher has identified at least a dozen juror websites made by government software maker Tyler Technologies that can easily expose jurors' personal data. buff.ly/HfJEACc 

#Vulnerabilities
#PrivacyBreach
#DataBreach
#Cybersecurity

⚠️ Threats, vulnerabilities, and risks - three words that sound similar but mean very different things. • Threat: What can cause harm • Vulnerability: What makes you weak • Risk: The chance of harm happening #Secura247 #Threats #Vulnerabilities #Risks #CyberEducation


Critical vulnerabilities in Fluent Bit expose cloud environments to remote attacks. Update to version 4.1.0+ immediately to secure your systems. thedailytechfeed.com/critical-vulne… #Vulnerabilities #Remote #Update #Security #Systems #Cloud #Attack #Protection #FluentBit #Technology #Alert

dailytechonx's tweet image. Critical vulnerabilities in Fluent Bit expose cloud environments to remote attacks. Update to version 4.1.0+ immediately to secure your systems. thedailytechfeed.com/critical-vulne… #Vulnerabilities #Remote #Update #Security #Systems #Cloud #Attack #Protection #FluentBit #Technology #Alert…

ثغرات خطيرة في Fluent Bit قد تمكّن المهاجمين من السيطرة على خدمات سحابية تستخدمه في مراقبة السجلات. الهجوم يعتمد على تنفيذ أوامر عن بُعد. تحديث عاجل مطلوب لوقف الاستغلال النشط. #FluentBit #CloudSecurity #Vulnerabilities #DevOps #CyberThreats

Mshoraty's tweet image. ثغرات خطيرة في Fluent Bit قد تمكّن المهاجمين من السيطرة على خدمات سحابية تستخدمه في مراقبة السجلات.

الهجوم يعتمد على تنفيذ أوامر عن بُعد.

تحديث عاجل مطلوب لوقف الاستغلال النشط.

#FluentBit #CloudSecurity #Vulnerabilities #DevOps #CyberThreats

#WhatsApp closes #security_gap #Vulnerabilities that let researchers collect data on 3.5B accounts ift.tt/Va8M6B3

omvapt's tweet image. #WhatsApp closes #security_gap #Vulnerabilities  that let researchers collect data on 3.5B accounts 
ift.tt/Va8M6B3

Meltdown and Spectre. Vulnerabilities in modern computers leak passwords and sensitive data meltdownattack.com #meltdown #security #vulnerabilities


Multiple #critical #vulnerabilities have been identified in #VMware products, with evidence of active exploitation by #ransomware groups. Organizations using these products should urgently apply the recommended patches to mitigate potential risks. 1. CISA Adds Four Known…

club31337's tweet image. Multiple #critical #vulnerabilities have been identified in #VMware products, with evidence of active exploitation by #ransomware groups. 

Organizations using these products should urgently apply the recommended patches to mitigate potential risks.  

 1. CISA Adds Four Known…

Pentesting 101 📚 Do you want to gain the fundamental skills to conduct a #penetrationtesting engagement but don't know where to start? This free Module is the answer for all the beginners out there! Explore practical techniques for finding #vulnerabilities and exploiting them…

hackthebox_eu's tweet image. Pentesting 101 📚 
Do you want to gain the fundamental skills to conduct a #penetrationtesting engagement but don't know where to start? This free Module is the answer for all the beginners out there! Explore practical techniques for finding #vulnerabilities and exploiting them…

⚠️ CVE-2025-3746 🖥️ WordPress OTP-less one tap signin plugin 💬 vulnerable to privilege escalation via account takeover 🔗 cve.mitre.org/cgi-bin/cvenam… #ransomNews #vulnerabilities #security #CVE

ransomnews's tweet image. ⚠️ CVE-2025-3746
🖥️ WordPress OTP-less one tap signin plugin
💬 vulnerable to privilege escalation via account takeover 
🔗 cve.mitre.org/cgi-bin/cvenam…

#ransomNews #vulnerabilities #security #CVE

Did you know that all Social Media sites come with psychosocial #vulnerabilities that antimalware can protect you from! Check out: Trick or Tweet? The Vulnerabilities Inherent to Twitter and All Social Networks - ow.ly/PNmw50X2xoF

WorkingTheWeb2W's tweet image. Did you know that all Social Media sites come with psychosocial #vulnerabilities that antimalware can protect you from! Check out: Trick or Tweet? The Vulnerabilities Inherent to Twitter and All Social Networks - ow.ly/PNmw50X2xoF

🗨️ “As we move into 2025, security teams face a growing wave of AI-powered threats, social engineering attacks, identity exploitation, and supply chain #vulnerabilities”. In their session 'Future‑Proofing Against Cybercrime: The Six Trends Every Organisation Must Know',…

BcnCyberCon's tweet image. 🗨️ “As we move into 2025, security teams face a growing wave of AI-powered threats, social engineering attacks, identity exploitation, and supply chain #vulnerabilities”. In their session 'Future‑Proofing Against Cybercrime: The Six Trends Every Organisation Must Know',…

✅ Very happy to report that we have completed STEP 2 of #LUPUSALERT, asking a large international panel to triage & prioritize #lupus #vulnerabilities suggested during step 1, for inclusion in the final screening questionnaire 👍 Thanks to you all for your contributions 👏

Lupusreference's tweet image. ✅ Very happy to report that we have completed STEP 2 of #LUPUSALERT, asking a large international panel to triage & prioritize #lupus #vulnerabilities suggested during step 1, for inclusion in the final screening questionnaire 👍 Thanks to you all for your contributions 👏

When #Vulnerabilities Pile Up - Finding the Real Value in #Security #Assessments Every year, a familiar pattern emerges. An organization invests in #penetration #testing. The report comes back. Dozens, sometimes hundreds, of findings. Fast forward 12 months... the same…

logisekict's tweet image. When #Vulnerabilities Pile Up - Finding the Real Value in #Security #Assessments

Every year, a familiar pattern emerges. An organization invests in #penetration #testing. The report comes back. Dozens, sometimes hundreds, of findings.

Fast forward 12 months... the same…

#PrecisionMedicine is IMPORTANT in #Lupus, but PERSONALIZED medicine, - taking into account the personal socio-economic determinants & patient #vulnerabilities-, is even MORE IMPORTANT. Check our latest PAPER with @G_O_Daniel & Zoe from @LupusEurope at: sciencedirect.com/science/articl…

Lupusreference's tweet image. ✅ #PrecisionMedicine is IMPORTANT in #Lupus, but PERSONALIZED medicine, - taking into account the personal socio-economic determinants & patient #vulnerabilities-, is even MORE IMPORTANT. Check our latest PAPER with @G_O_Daniel & Zoe from @LupusEurope at: sciencedirect.com/science/articl…

Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies

PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies
PTsecurity_EN's tweet image. Critical flaws in ATEN KVM switches gave attackers full control remotely. Thanks to the team for the catch and @Sc4rlet9 especially! Patch now and stay protected. #Cybersecurity #Vulnerabilities #PositiveTechnologies

A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. Get the full story ➡️ bit.ly/45R1ogq #cybersecurity

onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity
onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity
onapsis's tweet image. A new, weaponized exploit for critical #SAP #vulnerabilities CVE-2025-31324 and CVE-2025-42999 is now public. If your systems are unpatched, they're at high risk. Act now: apply SAP security notes 3594142 and 3604119. 

Get the full story ➡️ bit.ly/45R1ogq #cybersecurity

Just picked up my holiday photos! 50% landscapes, 50% Grype being @GrypeProject 👽📷 #vulnerabilities #security #family

SyftProject's tweet image. Just picked up my holiday photos!
50% landscapes, 50% Grype being @GrypeProject 👽📷
#vulnerabilities #security #family
SyftProject's tweet image. Just picked up my holiday photos!
50% landscapes, 50% Grype being @GrypeProject 👽📷
#vulnerabilities #security #family

At the launch of the #FutureOfAid2040 report in Delhi, #humanitarians underscored the need to build collectives and understand where #vulnerabilities came from and how they were reshaped. While bridging policy frameworks, it was also essential to ensure that, in the future,…

SeedsIndia's tweet image. At the launch of the #FutureOfAid2040 report in Delhi, #humanitarians underscored the need to build collectives and understand where #vulnerabilities came from and how they were reshaped.

While bridging policy frameworks, it was also essential to ensure that, in the future,…

Loading...

Something went wrong.


Something went wrong.


United States Trends