Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: exploited

  1. Home
  2. exploited

Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks

cisco-firewall-zero-days-exploited-in-china-linked-arcanedoor-attacks

Leading to remote code execution and privilege escalation, the flaws were exploited on Cisco ASA 5500-X series devices that lack secure boot.

The post Cisco Firewall Zero-Days Exploited in China-Linked ArcaneDoor Attacks appeared first on SecurityWeek.

Cisco Patches Zero-Day Flaw Affecting Routers and Switches

cisco-patches-zero-day-flaw-affecting-routers-and-switches

The security defect allows remote attackers with administrative privileges to execute arbitrary code as the root user.

The post Cisco Patches Zero-Day Flaw Affecting Routers and Switches appeared first on SecurityWeek.

GeoServer Flaw Exploited in US Federal Agency Hack

geoserver-flaw-exploited-in-us-federal-agency-hack

The hackers remained undetected for three weeks, deploying China Chopper, remote access scripts, and reconnaissance tools.

The post GeoServer Flaw Exploited in US Federal Agency Hack appeared first on SecurityWeek.

Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers

libraesva-email-security-gateway-vulnerability-exploited-by-nation-state-hackers

Tracked as CVE-2025-59689, the command injection bug could be triggered via malicious emails containing crafted compressed attachments.

The post Libraesva Email Security Gateway Vulnerability Exploited by Nation-State Hackers appeared first on SecurityWeek.

SolarWinds Makes Third Attempt at Patching Exploited Vulnerability

solarwinds-makes-third-attempt-at-patching-exploited-vulnerability

CVE-2025-26399 is a patch bypass of CVE-2024-28988, which is a patch bypass of the exploited CVE-2024-28986.

The post SolarWinds Makes Third Attempt at Patching Exploited Vulnerability appeared first on SecurityWeek.

CISA Analyzes Malware From Ivanti EPMM Intrusions

cisa-analyzes-malware-from-ivanti-epmm-intrusions

Hackers chained two Ivanti EPMM vulnerabilities to collect system information, dump credentials, and execute malware.

The post CISA Analyzes Malware From Ivanti EPMM Intrusions appeared first on SecurityWeek.

Chrome 140 Update Patches Sixth Zero-Day of 2025

chrome-140-update-patches-sixth-zero-day-of-2025

An exploited type confusion in the V8 JavaScript engine tracked as CVE-2025-10585 was found by Google Threat Analysis Group this week.

The post Chrome 140 Update Patches Sixth Zero-Day of 2025 appeared first on SecurityWeek.

Samsung Patches Zero-Day Exploited Against Android Users

samsung-patches-zero-day-exploited-against-android-users

Reported by Meta and WhatsApp, the vulnerability leads to remote code execution and was likely exploited by a spyware vendor.

The post Samsung Patches Zero-Day Exploited Against Android Users appeared first on SecurityWeek.

DELMIA Factory Software Vulnerability Exploited in Attacks

delmia-factory-software-vulnerability-exploited-in-attacks

A deserialization of untrusted data in the MOM software allows attackers to achieve remote code execution.

The post DELMIA Factory Software Vulnerability Exploited in Attacks appeared first on SecurityWeek.

Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw

The Akira ransomware group is likely exploiting a combination of three attack vectors to gain unauthorized access to vulnerable appliances.

The post Akira Ransomware Attacks Fuel Uptick in Exploitation of SonicWall Flaw appeared first on SecurityWeek.

  • Previous
  • 1
  • ...
  • 4
  • 5
  • 6
  • ...
  • 31
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it