From tenable.com
From Managing Vulnerabilities to Managing Exposure: The Critical Shift You Can’t Ignore
1 1
Vulnerability management remains core to reducing cyber risk — but as the attack surface grows, teams need a risk-driven strategy that looks beyond vulnerabilities to see the bigger picture. Discover how exposure management unifies data and prioritizes real exposures — keeping teams proactive...
#vulnerability #vulnerabilities
18h ago
From beyondmachines.net
Critical flaws in Mitel SIP phones allow command injection and unauthorized file upload
1 1
Mitel has patched multiple security vulnerabilities in its SIP phone product line, including a critical command injection flaw (CVE-2025-47188, CVSS 9.8) that allows unauthenticated attackers to execute arbitrary commands and potentially access sensitive system data. Mirai botnet already...
#infosec #advisory #cybersecurity #vulnerability
12h ago
From beyondmachines.net
Critical vulnerability in Cisco IOS XE Wireless Controller allows arbitrary file upload
1 1
Cisco has patched a critical vulnerability (CVE-2025-20188, CVSS 10.0) in its IOS XE Wireless Controller Software that exploits a hard-coded JSON Web Token in the Out-of-Band AP Image Download feature, allowing unauthenticated remote attackers to upload files, perform path traversal, and execute...
#infosec #advisory #cybersecurity #vulnerability
14h ago