by Fortify Security Team | Jul 17, 2023 | Actively Exploited, Apple
A vulnerability has been discovered in Apple products, which could allow for arbitrary code execution. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. iPadOS is the successor to iOS 12 and is a mobile operating system...
by Fortify Security Team | Jul 17, 2023 | Actively Exploited, Fortinet
A vulnerability has been discovered in Fortinet FortiOS and FortiProxy, which could allow for remote code execution. FortiOS is the Fortinet’s proprietary Operation System which is utilized across multiple product lines. FortiProxy is a secure web gateway that...
by Fortify Security Team | Jul 17, 2023 | Actively Exploited, Industry News
Title: Thousands of Images on Docker Hub Leak Auth Secrets, Private Keys Date Published: July 16, 2023 https://www.bleepingcomputer.com/news/security/thousands-of-images-on-docker-hub-leak-auth-secrets-private-keys/ Excerpt: “Researchers at the RWTH Aachen University...
by Fortify Security Team | Jul 14, 2023 | Actively Exploited, Industry News
Title: Indexing Over 15 Million WordPress Websites with PWNPress Date Published: July 14, 2023 Indexing Over 15 Million WordPress Websites with PWNPress Excerpt: “Sicuranex’s PWNPress platform indexed over 15 million WordPress websites, it collects data related to...
by Fortify Security Team | Jul 14, 2023 | Security Advisories
Multiple vulnerabilities have been discovered in Progress Moveit Transfer, which could allow for unauthorized database access. MOVEit Transfer is a managed file transfer software that allows the enterprise to securely transfer files between business partners and...