CATEGORY: ATTACK SURFACE MANAGEMENT

  • Mitel MiCollab NVM CVE

    Exploited! NuPoint Unified Messaging (NPM) Component of Mitel MiCollab

  • Alert: Zero-day vulnerability update for PAN-OS (CVE-2024-0012), an authentication bypass.

    Exploitable! CVE-2024-0012 Authentication Bypass for PAN-OS

  • Security alert: Zero-day vulnerability update for CVE-2024-10924 affecting millions of WordPress sites due to a security plugin flaw.

    CVE-2024-10924 Explained: Security plugin flaw in millions of WordPress sites

  • Graphic of the Ionix Cloud Exposure Validator. The graphic features a blue box with the title and a thumbs up.

    IONIX Launches Cloud Exposure Validator: Bringing CTEM to Cloud Security

  • Ionix graphic illustrating third party vendor cybersecurity risks with the title "Understanding Third-Party Vendor Cybersecurity Risks" and three red circles connected by a blue triangle.

    Third-Party Security Risks: The Complete Guide

  • Ionix Security Alert: Zero-Day Vulnerability Update addressing Citrix Session Recording vulnerabilities CVE-2024-8068 and CVE-2024-8069.

    CVE-2024-8068 and CVE-2024-8069: Citrix Session Recording Vulnerability

  • Security alert: Zero-day vulnerability update (CVE-2024-50340) for Symfony Profiler, allowing remote access via injected arguments.

    Understanding CVE-2024-50340 – Remote Access to Symfony Profiler

  • Illustration of a computer screen displaying the text "WEB APP SECURITY: COMMON THREATS AND BEST PRACTICES" in red against a white background. The computer is set against a gradient background of purple and pink.

    Web Application Security: From Business Risk to Technical Defense

  • RCE CyberPanel

    CVE-2024-51567 Code Execution Vulnerability in CyberPanel

  • Ionix graphic with the title: Attack Surface Analysis and Mapping: Process and Best Practices

    Attack Surface Analysis and Mapping Step By Step

  • Graph depicting the complexity of attack surface management in cloud environments. The graph shows multiple cloud icons in different colored circles, symbolizing the distributed nature of cloud infrastructure and the challenges in securing it.

    Complexity of Attack Surface Management in Cloud Environments

  • Ionix graphic illustrating the question: "Pen testing, DAST, and ASM: competitors or complementary?"

    The Difference Between Pentesting, DAST and ASM | IONIX