Your browser does not seem to support JavaScript. As a result, your viewing experience will be diminished, and you have been placed in read-only mode.
Please download a browser that supports JavaScript, or enable it if it's disabled (i.e. NoScript).
In-the-wild XSS attacks have commenced against the security appliance (CVE-2020-3580), as researchers publish exploit code on Twitter.
https://threatpost.com/cisco-asa-bug-exploited-poc/167274/
Microsoft is urging customers to patch two Active Directory domain controller bugs after a PoC tool was publicly released on Dec. 12.
https://threatpost.com/active-directory-bugs-windows-domain-takeover/177185/
A year-old proof-of-concept attack that allows an attacker to bypass TLS email protections to snoop on messages has been patched.
https://threatpost.com/email-bug-message-snooping-credential-theft/167125/
Meanwhile, a Microsoft analysis that followed six Iranian threat actor groups for over a year found them increasingly sophisticated, adapting and thriving.
https://threatpost.com/exchange-fortinet-exploited-iranian-apt-cisa/176395/