Aggregator
CVE-2024-49209 | Archer Platform up to 2024.08 API authorization (EUVD-2024-43282)
CVE-2024-48761 | Celk Saude 3.1.252.1 erro information exposure (EUVD-2024-43255)
CVE-2024-48126 | HI-SCAN 6040i Hitrax HX-03-19-I hard-coded credentials (EUVD-2024-43235)
CVE-2024-48956 | Serviceware Processes up to 7.3 HTTP Request improper authentication (EUVD-2024-43178)
CVE-2024-48651 | ProFTPD up to 1.3.8b mod_sql missing initialization (Issue 1830 / EUVD-2024-43211)
CVE-2024-49208 | Archer Platform up to 2024.06 authorization (EUVD-2024-43281)
CVE-2024-48938 | Znuny up to 6.5.10/7.0.16 Email Parser resource consumption (EUVD-2024-43140)
CVE-2024-48080 | aedes 0.51.2 Request denial of service (EUVD-2024-43161)
CVE-2024-48955 | NetAdmin 4.0.30319 improper authorization (EUVD-2024-43149)
Hackers Leak Data of 10,000 VirtualMacOSX Customers in Alleged Breach
CVE-2024-48822 | Automatic Systems Maintenance SlimLane 29565_d74ecce0c1081d50546db573a499941b10799fb7 FtpConfig.php default permission (EUVD-2024-43116)
CVE-2024-48824 | Automatic Systems Maintenance SlimLane 29565_d74ecce0c1081d50546db573a499941b10799fb7 download-file.php Racine/FileName information disclosure (EUVD-2024-43118)
CVE-2024-48789 | INATRONIC com.inatronic.drivedeck.home 2.6.23 Firmware Update information disclosure (EUVD-2024-43102)
Microsoft-Signed Firmware Module Bypasses Secure Boot
Hackers could circumvent the protections of Secure Boot by silently disabling it through an attack that potentially affects a wide swath of Windows laptops and servers. Microsoft issued a patch this month and hackers would already need admin access and physical access to a target machine.
Drive Innovation Through Advanced NHI Management
Why is Advanced NHI Management Crucial for Driving Innovation? Where data is the new gold, organizations must ensure the safety of this precious commodity. But how can this be achieved? Could enhancing Non-Human Identities (NHIs) management be a powerful tool to drive innovation and boost cybersecurity? One might argue that the answer lies in advanced […]
The post Drive Innovation Through Advanced NHI Management appeared first on Entro.
The post Drive Innovation Through Advanced NHI Management appeared first on Security Boulevard.
Scalable Secrets Management for Growing Businesses
Why is NHI Management Crucial for Growing Businesses? Growing businesses face the continuous challenge of ensuring their cybersecurity measures scale with their expansion. With companies evolve, so do the number and complexity of Non-Human Identifiers (NHIs) used within their systems. What is the secret to managing this increasing complexity? It lies in the scalable implementation […]
The post Scalable Secrets Management for Growing Businesses appeared first on Entro.
The post Scalable Secrets Management for Growing Businesses appeared first on Security Boulevard.
Gain Full Control Over Your Digital Identities
Why does Digital Identity Control Matter in Cybersecurity? Do you fully control your digital identities? Managing Non-Human Identities (NHIs) and their secrets has become a fundamental pillar in cybersecurity. NHIs, often referred to as machine identities, play an increasingly critical role in securing a robust digital infrastructure. Understanding Non-Human Identities (NHIs) Might it be possible […]
The post Gain Full Control Over Your Digital Identities appeared first on Entro.
The post Gain Full Control Over Your Digital Identities appeared first on Security Boulevard.
CVE-2025-21420
Microsoft-Signed Firmware Module Bypasses Secure Boot
Hackers could circumvent the protections of Secure Boot by silently disabling it through an attack that potentially affects a wide swath of Windows laptops and servers. Microsoft issued a patch this month and hackers would already need admin access and physical access to a target machine.