[KIS-2022-03] ImpressCMS <= 1.4.2 (findusers.php) Incorrect Access Control Vulnerability
Posted by Egidio Romano on Mar 22 -------------------------------------------------------------------------- ImpressCMS <= 1.4.2 (findusers.php) Incorrect Access Control Vulnerability -------------------------------------------------------------------------- [-] Software Link: https://www.impresscms.org [-] Affected Versions: Version...
[KIS-2022-02] ImpressCMS <= 1.4.2 (image-edit.php) Path Traversal Vulnerability
Posted by Egidio Romano on Mar 22 ----------------------------------------------------------------- ImpressCMS <= 1.4.2 (image-edit.php) Path Traversal Vulnerability ----------------------------------------------------------------- [-] Software Link: https://www.impresscms.org [-] Affected Versions: Version 1.4.2...
[KIS-2022-01] ImpressCMS <= 1.4.2 (autologin.php) Authentication Bypass Vulnerability
Posted by Egidio Romano on Mar 22 ----------------------------------------------------------------------- ImpressCMS <= 1.4.2 (autologin.php) Authentication Bypass Vulnerability ----------------------------------------------------------------------- [-] Software Link: https://www.impresscms.org [-] Affected Versions: Version 1.4.2...
#IMOS22: Ciaran Martin Discusses Cyber Threats from the Russia-Ukraine Conflict
Ciaran Martin believes organizations must be prepared for heightened cyber risks emanating from the Russia-Ukraine conflict Read More
swaylock-1.6-1.fc34
FEDORA-2022-194c3da292 Packages in this update: swaylock-1.6-1.fc34 Update description: Update to version 1.6. Contains security fix for CVE-2022-26530. Read More
5 Industries that need advanced Cybersecurity measures
This blog was written by an independent guest blogger. Cybersecurity is more important today than ever before, with virtual threats surging to historic highs. Organizations...
Dark Web Drug Peddler Gets Nine Years
Police cracked encrypted chat messages to bust organized crime group Read More
Okta Investigates Possible Lapsus Breach
Concerns rise that ransomware group used access to target customers Read More
6 steps to getting risk acceptance right
Cybersecurity and risk expert David Wilkinson has heard some executives put off discussions about risk acceptance, saying they don’t have any appetite or tolerance for...
Internet sanctions against Russia pose risks, challenges for businesses
Whether we wish to admit it, the way the internet is used is in the midst of a major morph due to the consequences of...