Skip to content
InfosecToday.com
  • Cybersecurity Glossary
InfosecToday.com

Exploitation 

A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.
Cybersecurity Vulnerabilities  | Remote Code Execution | Video Surveillance Security 

A total of 6,500 Axis servers are found to have the Remoting Protocol open, with 4,000 of them located in the United States susceptible to potential exploits.

CISA has included three D-Link vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog due to indications of ongoing exploitation.
Active Exploitation Alerts  | Cybersecurity Vulnerabilities  | D-Link Router Exploits

CISA has included three D-Link vulnerabilities in its Known Exploited Vulnerabilities (KEV) Catalog due to indications of ongoing exploitation.

Numerous Dell laptops are at risk of being compromised, allowing unauthorized access and ongoing malware infections.
Cybersecurity Vulnerabilities  | Firmware Security | Persistent Threats 

Numerous Dell laptops are at risk of being compromised, allowing unauthorized access and ongoing malware infections.

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.
Android Updates | Qualcomm Exploits  | Security Vulnerabilities

Google’s August update addresses two Qualcomm vulnerabilities that have been actively exploited.

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.
Firewall Exploitation  | Ransomware Attacks  | Zero-Day Vulnerabilities

SonicWall is actively searching for zero-day vulnerabilities following a significant increase in attacks targeting firewalls.

Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.
Android Security Vulnerabilities | Remote Code Execution Risks | Security Patch Management 

Serious vulnerability in Android system components permits remote code execution without requiring any user interaction.

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.
Cybersecurity Threats | Malicious Software Techniques  | Supply Chain Vulnerabilities

Malicious actors are currently taking advantage of weaknesses in the open-source ecosystem to distribute harmful software.

Akira Intensifies Attack on SonicWall Firewalls, Indicating Possible Zero-Day Vulnerability 
Cybersecurity Vulnerabilities  | Ransomware Activity | SSL VPN Exploitation 

Akira Intensifies Attack on SonicWall Firewalls, Indicating Possible Zero-Day Vulnerability 

© 2025 InfosecToday.com - WordPress Theme by Kadence WP

  • Cybersecurity Glossary
Search