Cisco Nexus Dashboard Configuration Backup REST API Unauthorized Access Vulnerability
A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Co...
Articles mapped to MITRE ATT&CK techniques. Select a technique to view matching articles.
138 articles found
A vulnerability in the configuration backup feature of Cisco Nexus Dashboard could allow an attacker who has the encryption password and access to Full or Co...
OpenAI has patched vulnerability, which Check Point said was because of a DNS loophole
Tax-season phishing floods deliver RMM malware, credential theft, BEC and tax-form scams
PwC Annual Threat Dynamics report says AI-threats are the biggest concern of clients
A vulnerability in the Lobby Ambassador web-based management API of Cisco IOS XE Software could allow an authenticated, remote attacker to elevate their priv...
Multiple vulnerabilities in the web-based management interface of Cisco Finesse, Cisco Packaged Contact Center Enterprise (Packaged CCE), Cisco Unified Conta...
Discover AI factories – the next evolution in data centers powering AI models. Understand their role, challenges and deployment best practices for 2026.
If you’ve ever done Linux memory forensics, you know the frustration: without debug symbols that match the exact kernel version, you’re stuck. These symbols ...
As AI deployment races ahead, security scrambles to keep up. Nikesh Arora on why AI's biggest risk is treating security as an afterthought.
Software signatures carry an invisible expiration date. The container image or firmware you sign today might be deployed for 20 years, but the cryptographic ...
Should verified identities become the standard online? Australia’s social media ban for under-16s shows why the question matters.
While our previous two blog posts provided technical recommendations for increasing the effort required by attackers to develop 0-click exploit chains, our e...
I recently attended the AI Engineer Code Summit in New York, an invite-only gathering of AI leaders and engineers. One theme emerged repeatedly in conversati...
Posted by Dave Kleidermacher, VP Engineering, Android Security & Privacy Today marks a watershed moment and new benchmark for open-source security and the fu...
Introduction In mid 2025, Google Threat Intelligence Group (GTIG) identified a sophisticated and aggressive cyber campaign targeting multiple industries, inc...
Unicode codepoint truncation - also called a Unicode overflow attack - happens when a server tries to store a Unicode character in a single byte.
Last year Johan Carlsson discovered you could conceal payloads inside the credentials part of the URL .
Through the years, we have seen many attacks exploiting web caches to hijack sensitive information or store malicious payloads.