Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30% of incidents impacted SMBs in 2024
Sophos found that compromise of network edge devices, such as VPN appliances, accounted for 30% of incidents impacted SMBs in 2024
A UK Law firm has been fined £60,000 after data stolen during a 2022 cyber-attack was published on the dark web
AI is transforming cybersecurity at a rapid pace, but how do we ensure security without compromising usability? In this episode of Threat Vector, host David Moulton sits down with Christopher DeBrunner, VP of Security Operations at CBTS, and Ryan Hamrick, Manager of Security Consulting Services. They explore how AI-driven security is improving threat detection, the risks of over-reliance on automation, and the challenges of maintaining data privacy in AI-enabled environments. The conversation dives into the future of AI governance, how organizations can balance security and user experience, and the role of ethical AI use in cybersecurity. Tune in for expert insights on keeping security effective and seamless.
compop.ca 3.5.3 – Arbitrary code Execution
Blood Bank & Donor Management System 2.4 – CSRF Improper Input Validation
IBMi Navigator 7.5 – HTTP Security Token Bypass
Angular-Base64-Upload Library 0.1.21 – Unauthenticated Remote Code Execution (RCE)
ABB Cylon Aspect 3.08.02 (ethernetUpdate.php) – Authenticated Path Traversal
ABB Cylon Aspect 3.08.02 (deployStart.php) – Unauthenticated Command Execution