Skip to content
Linkedin-in Envelope Map-marker-alt
×
  • Italiano
  • Inglese
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
SecurityIT | Consulenza Sulla Sicurezza Informatica
 
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti
×
  • La società
    • Chi siamo
    • Il team
    • La cultura dei valori
    • Mission
    • Azienda Certificata Iso
  • Formazione
    • Elenco corsi
  • Cyber security
    • Penetration test
    • Consulenza ISO/IEC 27001
    • Privacy
    • Vulnerability assessment
    • PCIDSS
    • Business continuity management e disaster recovery
    • Code security review
    • Mobile protection
    • Servizi di cyber threat intelligence
    • Analisi forense e investigazione
    • Social media Security
  • SOC
  • INTEGRAZIONI SISTEMI
    • Soluzioni
  • News
  • Contatti

Categoria: vulnerability

  1. Home
  2. vulnerability

Chinese Hackers Exploiting React2Shell Vulnerability

AWS has seen multiple China-linked threat groups attempting to exploit the React vulnerability CVE-2025-55182.

The post Chinese Hackers Exploiting React2Shell Vulnerability appeared first on SecurityWeek.

React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability

A researcher has pointed out that only instances using a newer feature are impacted by CVE-2025-55182.

The post React2Shell: In-the-Wild Exploitation Expected for Critical React Vulnerability appeared first on SecurityWeek.

Critical King Addons Vulnerability Exploited to Hack WordPress Sites

A critical-severity vulnerability in the King Addons for Elementor plugin for WordPress has been exploited to take over websites.

The post Critical King Addons Vulnerability Exploited to Hack WordPress Sites appeared first on SecurityWeek.

Chrome 143 Patches High-Severity Vulnerabilities

Chrome 143 stable was released with patches for 13 vulnerabilities, including a high-severity flaw in the V8 JavaScript engine.

The post Chrome 143 Patches High-Severity Vulnerabilities appeared first on SecurityWeek.

Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers

The Codex CLI vulnerability tracked as CVE-2025-61260 can be exploited for command execution.

The post Vulnerability in OpenAI Coding Agent Could Facilitate Attacks on Developers appeared first on SecurityWeek.

Android’s December 2025 Updates Patch Two Zero-Days

Google warns that two out of the 107 vulnerabilities patched in Android this month have been exploited in limited, targeted attacks.

The post Android’s December 2025 Updates Patch Two Zero-Days appeared first on SecurityWeek.

CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack

CISA has added CVE-2021-26829 to its Known Exploited Vulnerabilities (KEV) catalog.

The post CISA Warns of ScadaBR Vulnerability After Hacktivist ICS Attack appeared first on SecurityWeek.

Fluent Bit Vulnerabilities Expose Cloud Services to Takeover

Five flaws in the open source tool may lead to path traversal attacks, remote code execution, denial-of-service, and tag manipulation.

The post Fluent Bit Vulnerabilities Expose Cloud Services to Takeover appeared first on SecurityWeek.

Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day

CVE-2025-61757 is an unauthenticated remote code execution vulnerability affecting Oracle Identity Manager.

The post Critical Oracle Identity Manager Flaw Possibly Exploited as Zero-Day appeared first on SecurityWeek.

SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance

The vulnerabilities could be exploited to cause a denial-of-service (DoS) condition, execute arbitrary code, or access arbitrary files and directories.

The post SonicWall Patches High-Severity Flaws in Firewalls, Email Security Appliance appeared first on SecurityWeek.

  • 1
  • 2
  • 3
  • ...
  • 39
  • Next
SecurityIT | Consulenza Sulla Sicurezza Informatica
Linkedin-in Envelope Map-marker-alt

Il gruppo

  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission
×
  • La società
  • Azienda Certificata Iso
  • Chi siamo
  • Il team
  • La cultura dei valori
  • Mission

Servizi

  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
×
  • Servizi di consulenza informatica
  • Social media Security
  • Analisi forense e investigazione
  • Servizi di cyber threat intelligence
  • Mobile protection
  • Code security review
  • Business continuity management e disaster recovery
  • Payment card industry data security standard
  • Consulenza vulnerability assessment
  • Consulenza informatica in ambito privacy
  • Consulenza ISO/IEC 27001
  • Penetration test
© show.it | Tutti i diritti riservati | P.Iva 06984320017 | Privacy Policy | Cookie Policy | Realizzato da incio.it