The Cannon Corporation dba CannonDesign is sending notices of a data breach to more than 13,000 of current and former employees, informing that hackers breached and stole data from its network in an attack in early 2023. [...]
CodeBreaker technique can create code samples that poison the output of code-completing large language models, resulting in vulnerable — and undetectable — code suggestions.
American chipmaker Microchip Technology Incorporated has disclosed that a cyberattack impacted its systems over the weekend, disrupting operations across multiple manufacturing facilities. [...]
NIST has published the first cryptographic standards for protecting against attacks from quantum computers. Learn what this means for you and your organization.
As cloud infrastructure becomes the backbone of modern enterprises, ensuring the security of these environments is paramount. With AWS (Amazon Web Services) still being the dominant cloud it is important for any security professional to know where to look for signs of compromise. AWS CloudTrail stands out as an essential tool for tracking and logging API activity, providing a comprehensive
A vulnerability, which was classified as problematic, was found in OTA Sync Booking Engine Widget Plugin 1.2.7 on WordPress. This affects an unknown part. The manipulation leads to cross-site request forgery.
This vulnerability is uniquely identified as CVE-2024-7647. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in LH Add Media From Url Plugin up to 1.23 on WordPress. Affected by this issue is some unknown functionality. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-7090. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Phlox Pro Plugin up to 5.16.4 on WordPress. Affected by this vulnerability is an unknown functionality of the component Search Parameter Handler. The manipulation leads to cross site scripting.
This vulnerability is known as CVE-2024-6339. The attack can be launched remotely. There is no exploit available.
A vulnerability classified as problematic has been found in Responsive Video Plugin up to 1.0 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-7629. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in LiquidPoll Plugin up to 3.3.78 on WordPress. It has been rated as problematic. This issue affects some unknown processing. The manipulation of the argument form_data leads to cross site scripting.
The identification of this vulnerability is CVE-2024-7134. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in Smart Online Order for Clover Plugin up to 1.5.6 on WordPress. It has been declared as problematic. This vulnerability affects unknown code of the component Deactivation Handler. The manipulation leads to missing authorization.
This vulnerability was named CVE-2024-7032. The attack can be initiated remotely. There is no exploit available.