CYBER Threat Intelligence Reports


CVE-2024-0985: A Critical Security Vulnerability in PostgreSQL

CVE-2024-0985 poses a critical risk to PostgreSQL versions 12-15, allowing elevated privilege attacks via specific operations. Immediate upgrade to patched versions (12.18, 13.14, 14.11, 15.6)…

Read more >

CISA: Fortinet Security Advisories and CVE-2024-21762, CVE-2024-23313 Exploitation

Fortinet has issued updates for critical FortiOS vulnerabilities, CVE-2024-21762 and CVE-2024-23313, with the former actively exploited and the latter presenting a potential high-risk threat. Immediate…

Read more >

New Patch Bypasses for Critical FortiSIEM Vulnerability (CVE-2024-23108, CVE-2024-23109)

Fortinet clarifies CVE-2024-23108 and CVE-2024-23109 as patch bypasses for the critical FortiSIEM flaw CVE-2023-34992, enabling remote command execution. Fixes are promised in upcoming FortiSIEM releases,…

Read more >

Critical Shim Boot Loader Vulnerability Affects Linux Distributions (CVE-2023-40547)

CVE-2023-40547 poses a critical threat to Linux distributions with a CVSS score of 9.8, enabling Secure Boot bypass and potential remote code execution. Discovered by…

Read more >

Critical Vulnerabilities in Cisco Expressway Series

Cisco has patched critical CSRF vulnerabilities in its Expressway Series, CVE-2024-20252 and CVE-2024-20254, and a third vulnerability, CVE-2024-20255, affecting system configurations and causing DoS. Organizations…

Read more >

New Vulnerabilities in Azure HDInsight Services

New vulnerabilities in Azure HDInsight services, including privilege escalation and denial-of-service risks, have been patched by Microsoft. Key issues involve Apache Oozie, Ambari, Hadoop, Kafka,…

Read more >

Mass Exploitation of SSRF Flaw in Ivanti VPN Products (CVE-2024-21893)

The SSRF vulnerability CVE-2024-21893 in Ivanti VPN products has led to widespread exploitation, exposing severe security risks. Despite an initial fix, vulnerabilities persisted, prompting Ivanti…

Read more >

Critical Alert: CISA Flags High-Risk CVE-2023-4762 in Chromium V8 as Actively Exploited Vulnerability

CISA warns of actively exploited vulnerability CVE-2023-4762 in Chromium V8, urging immediate updates for versions before Chrome 116.0.5845.179. Rated high severity (CVSS 8.8), it allows…

Read more >

Cloudflare Endures Sophisticated Breach Tracing Back to Okta Compromise

Cloudflare countered a sophisticated nation-state cyberattack, originating from previously compromised Okta credentials, targeting its Atlassian server and internal systems. The company's rapid response and extensive…

Read more >

Cybersecurity Best Practice

10 Best Automated Penetration Testing Tools in 2023

You need automated penetration testing in order to continuously find vulnerabilities faster. Learn about the top 10 automated penetration testing tools

Read more >

Automated Pen Tests

Certified Pen test with tester certification

Looking to perform a Penetration test with certification? Learn how OP innovate can keep you secure with certified penetration testing. Leading Pen tester

Read more >

Pen Testing Certifications

Penetration Testing (Pen Testing) – What is it and why do I need it?

Penetration test, or Pen Testing is a type of security testing which is vital for any computer system to detect vulnerabilities and prevent web application…

Read more >

Pen Test

Finding the Best Cyber Security Assessment Services

The best way to find cybersecurity assessment services to help your organization find current cyber weaknesses is via cyber security assessment company

Read more >

Risk Assessment Services

Achieving the Best Cyber Security Incident Response

When companies suffer a breach, they need to perform an effective Incident response to quickly and effectively address it and minimize the impact.

Read more >

How to Achieve the Best Cyber Security Incident Response

How to Perform Vulnerability Remediation After a Pen Test

Discover how to perform efficient and effective vulnerability remediation after a penetration test with OP-C's comprehensive guide.

Read more >

How to perform effective vulnerability remediation
Under Cyber Attack?

Fill out the form and we will contact you immediately.