• Skip to content
  • Skip to primary sidebar
  • Skip to secondary sidebar

Cyber Threat Defense

Cyber Security News

Cisco Systems

Cisco Systems Webex Flaws Allows Remote Users To Execute Code

May 4, 2018 By News Team Leave a Comment

Cisco Systems’ WebEx conferencing platform has a critical vulnerability inside its recording function, which creates possibilities for remote code execution scenarios. The bug can be exploited if attackers are able to convince users to open a file … [Read more...] about Cisco Systems Webex Flaws Allows Remote Users To Execute Code

Filed Under: Cybercrime, Hacking Tagged With: ARF files, bug, Cisco, Cisco bugs, Cisco Systems, Cisco WebEx, critical vulnerabilities, Fortinet, patch, system update, videoconferencing

Cisco Systems Pathex Bug in Webex Players

December 7, 2017 By News Team Leave a Comment

Last week, Cisco Systems, the large-scale Internet services provider, issued a critical alert regarding a number of vulnerabilities in its WebEx player. The Cisco WebEx Meetings Server is a WebEx that can be hosted in a customers’ own private … [Read more...] about Cisco Systems Pathex Bug in Webex Players

Filed Under: Application Security, Hacking Tagged With: ARF player, bug, Cisco Systems, remote attacker, software updates, vulnerabilities, WebEx, WebEx extensions, WRF player

Primary Sidebar

Recent Articles

  • How Profits Inspires Virus Developers
  • What’s Propelling A10 Networks Inc (NYSE: ATEN) After Higher Shorts Reported?
  • FacexWorm Targets Facebook Messenger
  • Cisco Systems Webex Flaws Allows Remote Users To Execute Code
  • Europe sees Radical Drop in DDoS Attacks Since Seizure of Webstresser Site

Categories

  • Application Security
  • Bitcoin
  • Bot Defense
  • Browser Security
  • Business Models
  • Critical infrastructure
  • Cryptocurrencies
  • Cryptojacking
  • Cryptomining
  • Cybercrime
  • cybersecurity
  • Data Breach
  • Data Theft
  • DDoS
  • Endpoint Security
  • Espionage
  • Feature
  • Firewall
  • Fraud
  • Government
  • Hacking
  • Hacking Tools
  • IoT
  • Layer7
  • Leaks
  • Malware
  • Mining
  • Mobile security
  • Point of Sale Devices
  • Quantum Encryption
  • Quantum Security
  • Ransomware
  • Routing
  • Uncategorized
  • Vault7
  • Vault8
  • Vulnerabilities
  • Wikileaks

Secondary Sidebar

Cyber Threat Defense.net | Copyright © 2019 All product names, logos, and brands are property of their respective owners. All company, product and service names used on site are for identification purposes only. Use of these names, logos, and brands does not imply endorsement.