CyRisk Vulnerability Management Team

1 min read

Mitigation Instructions for PureFTPD

Securing PureFTPD is essential to safeguard data integrity and prevent unauthorized access to your system. Here's a comprehensive approach to achieving these goals:

Read More

1 min read

Mitigation Instructions for ProFTPD mod_sftp

Securing ProFTPD with mod_sftp involves several steps to ensure data integrity and prevent unauthorized access:

Read More

1 min read

Mitigation Instructions for Remote Desktop Protocol (RDP)

General Remediation Steps to Safeguard Remote Desktop Protocol (RDP):

Read More

1 min read

Mitigation Instructions for Apple Remote Desktop VNC

To safeguard Apple Remote Desktop (ARD) VNC (Virtual Network Computing), a tool that enables remote access and management of Apple devices, follow...

Read More

1 min read

Mitigation Instructions for OpenSSH

To safeguard OpenSSH, which is a widely used tool for secure remote access to servers, follow these general remediation instructions to enhance its...

Read More

1 min read

Mitigation Instructions for CVE-2022-31813

SUBJECT:CVE-2022-31813 IP based authentication bypass

Read More

1 min read

Mitigation Instructions for CVE-2023-25690

SUBJECT:CVE-2023-25690 HTTP Request Smuggling attack

Read More

2 min read

Mitigation Instructions for CVE-2020-2021

SUBJECT:CVE-2020-2021: Improper Verification of Signatures in PAN-OS SAML Authentication

Read More

2 min read

Mitigation Instructions for CVE-2019-1579

SUBJECT:CVE-2019-1579 Remote Code Execution in PAN-OS GlobalProtect Interface

Read More

1 min read

Mitigation Instructions for CVE-2021-27065

SUBJECT:CVE-2021-27065 Microsoft Exchange Server Remote Code Execution Vulnerability (HAFNIUM Exploited)

Read More