M.A. Polce

vulnerabilities

vulnerabilities

An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Fortinet Patches for Vulnerabilities in FortiNAC, FortiWeb

Overview Throughout the past week, Fortinet released numerous security advisories regarding the availability of patches for product vulnerabilities. These patch releases address critical flaws affecting ForiNAC and FortiWeb products. Two…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Citrix Security Updates for Workspace Apps, Virtual Apps and Desktop

Overview Citrix has released security updates for new vulnerabilities within their Citrix Workspace Apps and Virtual Apps and Desktops. If applicable, address the vulnerabilities immediately. Doing so will prevent users…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Apple Releases Security Updates for Multiple Products

Overview Apple released new security updates corresponding to vulnerabilities found in various products on January 23rd, 2023. Any device with a vulnerability is at risk of an attacker gaining access.…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Attackers Exploit Critical Flaw in Many Zoho ManageEngine Products

Overview There are new vulnerabilities discovered on Zoho ManageEngine products related to CVE-2022-47966, which allow for unauthenticated RCE – Remote Code Execution. This is the effect of an outdated Apache…
An M.A. Polce IT and Cybersecurity branded graphic that indicates the associated post content is a cybersecurity update and/or threat alert

Threat Actors Bypass Microsoft Exchange ProxyNotShell Mitigations

Overview In September of 2022, GTSC reported a critical infrastructure attack that took place in August of 2022. The investigation revealed that the threat actor used two zero-day vulnerabilities in…
Join Our Newsletter

Download the "How Strong is Your Cybersecurity Culture?" Checklist!

Name(Required)