enterprise
![Palo Alto Networks](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/17164805/palo_alto_networks-1-1500-400x200.webp)
Palo Alto firewalls: Public exploits, rising attacks, ineffective mitigation
UPDATE: April 30, 09:30 AM ET New story: Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades While it initially seemed that …
![Delinea Secret Server](https://img.helpnetsecurity.com/wp-content/uploads/2024/04/15130003/delinea_secret_server-1200-400x200.webp)
A critical vulnerability in Delinea Secret Server allows auth bypass, admin access
Organizations with on-prem installations of Delinea Secret Server are urged to update them immediately, to plug a critical vulnerability that may allow attackers to bypass …
![Microsoft SharePoint](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28111930/microsoft_office_sharepoint-28032024-400x200.webp)
New covert SharePoint data exfiltration techniques revealed
Varonis Threat Labs researchers have uncovered two techniques attackers can use can use for covert data and file exfiltration from companies’ SharePoint server. …
![Ivanti](https://img.helpnetsecurity.com/wp-content/uploads/2024/01/19151341/ivanti-blocks2-1400-400x200.jpg)
Ivanti vows to transform its security operating model, reveals new vulnerabilities
Ivanti has released patches for new DoS vulnerabilities affecting Ivanti Connect Secure (SSL VPN solution) and Ivanti Policy Secure (NAC solution), some of which could also …
![Microsoft SharePoint](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/28111930/microsoft_office_sharepoint-28032024-400x200.webp)
Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)
The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 – a code injection vulnerability that allows authenticated attackers to execute code …
![Ray](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/27095008/ray-1500-400x200.webp)
AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)
Attackers are leveraging a vulnerability (CVE-2023-48022) in Anyscale’s Ray AI software to compromise enterprise servers and saddle them with cryptominers and reverse …
![Microsoft Exchange](https://img.helpnetsecurity.com/wp-content/uploads/2023/03/28181244/exchange-fire-connect-400x200.jpg)
17,000+ Microsoft Exchange servers in Germany are vulnerable to attack, BSI warns
Around 12% of the 45,000 or so Microsoft Exchange servers in Germany that can be accessed from the Internet without restrictions “are so outdated that security updates …
![smartphone](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/26085255/smartphone_data-2-1500-400x200.webp)
Apps secretly turning devices into proxy network nodes removed from Google Play
Your smartphone might be part of a proxy network, and you might not even know it: all it takes is for you to download apps whose developers have included the functionality and …
![Ivanti](https://img.helpnetsecurity.com/wp-content/uploads/2023/07/31150730/ivanti2-400x200.jpg)
Ivanti fixes RCE vulnerability reported by NATO cybersecurity researchers (CVE-2023-41724)
Ivanti has fixed a critical RCE vulnerability (CVE-2023-41724) in Ivanti Standalone Sentry that has been reported by researchers with the NATO Cyber Security Centre. Though …
![NIST NVD](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/19152647/nist-nvd-1500-400x200.webp)
NIST’s NVD has encountered a problem
Whether the cause is insurmountable technical debt, lack of funds, a third reason or all of them, NIST’s National Vulnerability Database (NVD) is struggling, and …
![arcserve](https://img.helpnetsecurity.com/wp-content/uploads/2023/11/29152921/arcserve-1400-400x200.jpg)
PoC for critical Arcserve UDP vulnerabilities published (CVE-2024-0799, CVE-2024-0800)
Arcserve has fixed critical security vulnerabilities (CVE-2024-0799, CVE-2024-0800) in its Unified Data Protection (UDP) solution that can be chained to upload malicious files …
![BSAM](https://img.helpnetsecurity.com/wp-content/uploads/2024/03/12133240/bsam-open-source-400x200.webp)
BSAM: Open-source methodology for Bluetooth security assessment
Many wireless headsets using Bluetooth technology have vulnerabilities that may allow malicious individuals to covertly listen in on private conversations, Tarlogic Security …