

Security Flaw in Email Security Gateway The California-based company investigation has...
Outlook Vulnerability Allows Zero-Click Attackers to Compromise User Authentication An...
Overview FortiOS SSL-VPN doesn't validate HTTP requests properly, leading to an overflow...
General information Two RCEs exist and three vectors are being discussed online (one of which is not known to be remotely exploitable):
This vulnerability can allow an attacker to, if exploited on a server, gain complete control over entire systems. Any system that could be exploited, should be...
At Holm Security, we provide solutions for vulnerability assessment. In meetings with our customers, we sometimes discuss previous incidents that could've...
The Delivery Mechanism This part of the cyber weapon ensures it hits its target - or reaches the right client, hardware, or network. The delivery can be done...
Today, not all systems are running yet and they estimated that it may take several months before they are up and running again. The attack probably started as...