VMware patches vRealize Operations vulnerabilities (CVE-2021-21975 and CVE-2021-21983)
VMware issued a security advisory for two vulnerabilities (CVE-2021-21975 and CVE-2021-21983) that impact vRealize Operations products.
VMware issued a security advisory for two vulnerabilities (CVE-2021-21975 and CVE-2021-21983) that impact vRealize Operations products.
Microsoft has published new detailed analysis of Exchange Server vulnerabilities, cybercriminal groups and post-compromise second stage attack malware. In addition, the tech giant offered sound mitigation guidance.
Apple has fixed a zero-day vulnerability CVE-2021-1879 exploited in the wild in the latest security updates for iOS iOS 14.4.2, iPadOS 14.4.2, and watchOS 7.3.3.
Samba has released software updates to fix two High severity security vulnerabilities (CVE-2020-27840 and CVE-2021-20277) that impact Samba products. A remote attacker could take advantage of these bugs and exploit unpatched systems.
OpenSSL has patched two High severity vulnerabilities CVE-2021-3449 and CVE-2021-3450 in certain OpenSSL versions. As a result, a bad actor could exploit and launch a Denial of Service attack against impacted systems.
Cybersecurity experts discovered active exploits against vulnerable WordPress sites running previously patched Thrive Themes and plugins.
The Mozilla Foundation has released Firefox 87 that introduces a new feature 'SmartBlock for Private Browsing' along with security fixes for two High risk vulnerabilities.
Energy giant Shell was the latest victim in a series of cyberattacks on customers of Accellion's legacy File Transfer Appliance (FTA) product used to transfer large files.
Adobe has released a security update to address a Critical vulnerability CVE-2021-21087 in Adobe ColdFusion.
Security researchers are warning of mass scans and active exploits of a Critical vulnerability on F5 BIG-IP and BIG-IQ infrastructure. F5 patched the Critical remote code execution vulnerability CVE-2021-22986 nearly two weeks ago when the networking company confirmed an unauthenticated attacker could exploit the vulnerability.