Skip to content
TheCyberThrone

Thinking Security ! Always

  • Latest Story
  • AI
  • Application Security
  • Cloud Security
    • AWS Security
    • Azure Security
    • Google Security
  • Container Security
  • Data Breaches
  • Email Security
  • Mobile Security
  • Security Acquisition
  • ZeroDay
  • Certification Guide
    • Cloud Certifications
    • Network Certifications
    • Security Certifications
  • Security NewsLetter
  • About Author
  • facebook.com
  • twitter.com
  • t.me
  • instagram.com
  • youtube.com
Subscribe

Security Advisory

  • Home
  • Security Advisory
VMware fixes vulnerabilities exploited in Pwn2Own Vancouver

VMware fixes vulnerabilities exploited in Pwn2Own Vancouver

VMware has released patches for Workstation and Fusion products towards the vulnerabilities exploited earlier this year at the Pwn2Own hacking competition. Three of the vulnerabilities were reported at the Pwn2Own…
Posted by PravinKarthik May 14, 2024
GitLab April 2024 Security Advisory – CVE-2024-2434

GitLab April 2024 Security Advisory – CVE-2024-2434

GitLab has released several security updates to addresses a series of vulnerabilities that could have affect code repositories and development workflows. These flaws range from the potential for complete account…
Posted by PravinKarthik April 26, 2024
Fortinet Patches several Vulnerabilities Affecting its Products

Fortinet Patches several Vulnerabilities Affecting its Products

Fortinet has released a security advisory and patches addressing several critical and high-severity vulnerabilities in their popular security products. These vulnerabilities could expose organizations to remote code execution, unauthorized file…
Posted by PravinKarthik April 10, 2024
Phobos Ransomware advisory from US Authorities

Phobos Ransomware advisory from US Authorities

The US CISA, the FBI, and MS-ISAC issued a joint advisory about the attacks involving Phobos ransomware variants such as Backmydata, Devos, Eight, Elking, and Faust. The attacks were observed…
Posted by PravinKarthik March 2, 2024
Trending post
  • CISSP Domain 2 – DLP Preventing Data Leakage
    CISSP Domain 2 – DLP Preventing Data Leakage
  • Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
    Mini Shai-Hulud: SAP's npm Pipeline Poisoned to Drain Enterprise Secrets
  • The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
    The Ungoverned Machine - Shadow AI Risk and the Enterprise Governance
  • CISSP Domain 2 – Data Handling and Security Policies
    CISSP Domain 2 – Data Handling and Security Policies
  • CISSP Domain 5: Zero Hour Exam Cram Series
    CISSP Domain 5: Zero Hour Exam Cram Series
  • PyTorch Lightning Poisoned — Mini Shai-Hulud Worm Crosses Into the AI/ML Supply Chain
    PyTorch Lightning Poisoned — Mini Shai-Hulud Worm Crosses Into the AI/ML Supply Chain
Archives

Click to Subscribe

Follow Us

  • Facebook
  • Twitter
  • Instagram
Copyright 2026 — TheCyberThrone. All rights reserved. Bloghash WordPress Theme
Scroll to Top