by Fortify Security Team | Mar 31, 2022 | Security Advisories
A vulnerability has been discovered in Trend Micro Apex Central which could allow for arbitrary file upload. Trend Micro Apex Central is a web-based console that provides centralized management for Trend Micro products and services at the gateway, mail server, file...
by Fortify Security Team | Jan 27, 2022 | Security Advisories
Multiple vulnerabilities have been discovered in Apple Products, the most severe of which could allow for arbitrary code execution. iOS is a mobile operating system for mobile devices, including the iPhone, iPad, and iPod touch. iPadOS is the successor to iOS 12 and...
by Fortify Security Team | Jul 16, 2021 | Industry News
Title: Cryptominer Farm Rigged with 3,800 PS4s Busted in Ukraine Date Published: July 14, 2021 Cryptominer Farm Rigged with 3,800 PS4s Busted in Ukraine Excerpt: “The cryptomining operation was set up in a warehouse in the city of Vinnytsia, formerly owned by a...
by Fortify Security Team | Jun 18, 2021 | Security Advisories
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could...
by Fortify Security Team | May 3, 2021 | Security Advisories
Multiple vulnerabilities have been discovered in Real-Time Operating Systems (RTOS), the most severe of which could allow for remote code execution. RTOS is an operating system intended to serve real-time applications that process data as it comes in. Successful...