Register
Login
Toggle navigation
SaaS Solutions
Vulnerability Intelligence
Pricing
Vulnerabilities
Reports
Blog
Contact Us
Main
Blog
With exploit
With patch
Element is not found
Back to the list
Latest Posts
Threat actors increasingly abusing Microsoft Graph
Graph API is often used for discreet communications to cloud-based C&C servers.
6 May 2024
Marriott admits its systems were not encrypted before 2018 data breach
Marriott has acknowledged that it used SHA-1 algorithm, which does not qualify as encryption.
6 May 2024
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany
The attacks targeted entities "related to Russia's war of aggression against Ukraine."
6 May 2024
Popular Posts
Threat actors increasingly abusing Microsoft Graph
Marriott admits its systems were not encrypted before 2018 data breach
Russian military spies APT28 exploited Outlook 0day to attack Czechia and Germany
Featured vulnerabilities
Multiple vulnerabilities in F5OS
Low
Patched
|
06 May, 2024
Marvin side channel attack in rust-openssl package
Medium
Patched
|
06 May, 2024
Multiple vulnerabilities in IBM QRadar Suite software
Medium
Patched
|
06 May, 2024
HTTP request smuggling in Gunicorn
Medium
Patched
|
06 May, 2024
Prototype pollution in Conform
High
Patched
|
06 May, 2024