Cisco Releases Security Updates for Multiple Products

Original release date: June 16, 2022Cisco has released security updates to address vulnerabilities in multiple Cisco products. An attacker could…

3 years ago

CISA Requests Public Comment on CISA’s TIC 3.0 Cloud Use Case

Original release date: June 16, 2022CISA has released Trusted Internet Connections (TIC) 3.0 Cloud Use Case for public comment. TIC…

3 years ago

SAP Releases June 2022 Security Updates

Original release date: June 14, 2022SAP has released security updates to address vulnerabilities affecting multiple products. An attacker could exploit…

3 years ago

Adobe Releases Security Updates for Multiple Products

Original release date: June 14, 2022Adobe has released security updates to address vulnerabilities in multiple products. An attacker could exploit…

3 years ago

Drupal Releases Security Updates

Original release date: June 13, 2022Drupal has released security updates to address a Guzzle third-party library vulnerability that does not…

3 years ago

CISA Provides Criteria and Process for Updates to the KEV Catalog

Original release date: June 7, 2022CISA has updated the Known Exploited Vulnerabilities (KEV) catalog webpage as well as the FAQs for…

3 years ago

Owl Labs Releases Security Updates for Meeting Owl Pro and Whiteboard Owl

Original release date: June 7, 2022Owl Labs has released security updates to address a vulnerability (CVE-2022-31460) in Meeting Owl Pro…

3 years ago

Google Releases Security Updates for Chrome

Original release date: June 10, 2022Google has released Chrome version 102.0.5005.115 for Windows, Mac, and Linux. This version addresses vulnerabilities…

3 years ago

CISA Adds Three Known Exploited Vulnerabilities to Catalog

Original release date: June 9, 2022CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence…

3 years ago

CISA Adds 36 Known Exploited Vulnerabilities to Catalog

Original release date: June 8, 2022CISA has added 36 new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence…

3 years ago

This website uses cookies.