Pegasus : A Friend Turned Foe
When it comes to IT security one of the most important tools to protect your information, is physical security and under that software that actually allows the vulnerabilities to stabilize…
When it comes to IT security one of the most important tools to protect your information, is physical security and under that software that actually allows the vulnerabilities to stabilize…
Cyber Security for children 1. Shield your Child from Cyber Crime is important in digital era it’s nearly impossible to keep kids out of the internet these days. After COVID-19…
Original Issue Date: May 28, 2021 Severity Rating: HIGH Software Affected Wordpress versions 3.7 to 5.7, PHPMailer library versions 6.1.8 to 6.4.0 Overview Multiple vulnerabilities have been reported in WordPress…
Introduction 1 Cyber Security. Computer security, cyber security or information technology security (IT security) is the protection of computer systems and networks from information disclosure, theft of or damage…
Original Issue Date: May 21, 2021 Severity Rating: HIGH Software Affected SAP Business Client Version 6.5SAP Commerce Versions 1808, 1811, 1905, 2005, 2011SAP Business Warehouse Versions 700, 701, 702, 711,…
Original Issue Date: May 21, 2021 Severity Rating: HIGH Software Affected IOS XE SD-WAN SoftwareSD-WAN cEdge RoutersSD-WAN vBond Orchestrator SoftwareSD-WAN vEdge RoutersSD-WAN vSmart Controller Software Overview Multiple vulnerabilities have been…
Original Issue Date: May 21, 2021 Severity Rating: HIGH Software Affected Acrobat DC and Acrobat Reader DC (Continuous) version 2021.001.20150 and prior for Windows & version 2021.001.20149 and prior for…
Original Issue Date: May 17, 2021 Severity Rating: MEDIUM Software Affected Juniper Networks Mist Access Point Firmware: 0.5 versions prior to 0.5.17562 on AP21, AP41, AP61 Series; 0.6 versions prior to…
Original Issue Date: May 17, 2021 Severity Rating: HIGH Software Affected. Google Chrome versions prior to 90.0.4430.212. Overview Multiple vulnerabilities have been reported in Google Chrome which could be exploited…
Introduction 1. Every Cybersecurity Security Agency (CSA) is aware that the all businesses having sensitive data & Critical Infrastructures (CI) are targets for the ransomware attack. Hence businesses and Critical…