• OPENVAS SECURITY INTELLIGENCE
  • Buy Here
  • Newsletter
  • Deutsch Deutsch German de
  • English English English en
  • Italiano Italiano Italian it
  • Nederlands Nederlands Dutch nl
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for Your Sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap & Lifecycle
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
  • Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • Attack Vector Timeline
      • The Vulnerability Timeline
  • Click to open the search input field Click to open the search input field Search
  • Menu Menu
  • Products
    • OPENVAS SCAN
    • OPENVAS REPORT
    • OPENVAS BASIC
      • OPENVAS BASIC: Order
    • Greenbone Cloud Service
    • Greenbone Web App Scanning
    • Solutions for your sector
      • Educational Sector
      • Healthcare Sector
      • Public Sector
    • Technology
      • Feed Comparison
      • Product Comparison
        • OPENVAS vs. Nessus
      • Roadmap and Lifecycle
    • Buy Here
  • Service & Support
    • Technical Support
    • Self-Learning Courses
    • Documents
  • Events
    • Webinars
  • About Greenbone
    • Greenbone Group
    • Partners
    • Careers
    • Contact
    • Newsletter
  • Our Blog
    • Know-how
      • Cyber Attacks Defense
      • Cyber Defense Security
      • Cyber Resilience Act
      • Data Security
      • IT Security
      • Open Source Vulnerability Management
      • The Vulnerability Timeline
      • Attack Vector Timeline
  • Deutsch
  • English
  • Italiano
  • Nederlands
Dirk Boeing

The CPU as a Weakness: how to Manage Hardware Risks with Confidence

Blog

Vulnerabilities in IT environments appear in different forms. The most common ones are likely software vulnerabilities that have not been patched. Then there are weak passwords, misconfigurations or network switches that have been EOL for five years. However, another type of security gap sometimes causes significant confusion during the scans: hardware vulnerabilities. We have become […]

Read more
2. April 2025/by Dirk Boeing
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Dirk Boeing https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Dirk Boeing2025-04-02 12:00:332025-04-02 12:00:33The CPU as a Weakness: how to Manage Hardware Risks with Confidence
Joseph Lee

AMI BMC Flaw: Remote Takeover and DoS of Server Infrastructure

Blog

A new critical vulnerability of the highest possible severity score – CVE-2024-54085, CVSS 10 – has just been disclosed. It is found in the widely used American Megatrends’ (AMI) MegaRAC BMC (Baseboard Management Controller) software allowing authentication bypass and exploitation. Due to AMI’s dominant role in the motherboard supply chain, dozens of major hardware vendors […]

Read more
1. April 2025/by Joseph Lee
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Joseph Lee https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Joseph Lee2025-04-01 12:48:502025-04-01 12:48:50AMI BMC Flaw: Remote Takeover and DoS of Server Infrastructure
Joseph Lee

Escalating Attacks Targeting CVE-2024-4577 in PHP-CGI for Windows

Blog

CVE-2024-4577 (CVSS 9.8 Critical) is currently climbing the winners’ podium of the most malicious security vulnerabilities. Disclosed in early June 2024 by Devcore security researchers, weaponization began within a mere 48 hours. It is a PHP-CGI OS Command Injection vulnerability [CWE-78] impacting PHP for Windows. Attacks distributing “TellYouThePass” ransomware were immediately observed and the CVE […]

Read more
26. March 2025/by Joseph Lee
https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg 0 0 Joseph Lee https://www.greenbone.net/wp-content/uploads/greenbone-logo-2025.svg Joseph Lee2025-03-26 13:48:592025-03-26 13:48:59Escalating Attacks Targeting CVE-2024-4577 in PHP-CGI for Windows
Page 8 of 48«‹678910›»

Search

Search Search

Newsletter

Subscribe Now

Archive

  • 2025
  • 2024

Products & Solutions

  • OPENVAS SCAN
  • OPENVAS REPORT
  • OPENVAS BASIC
  • OPENVAS FREE
  • Greenbone Cloud Service
  • Greenbone Web App Scanning
ISO9001-EN

Service & Support

  • Technical Support
  • FAQ
  • Documents
  • Warranty
  • Open Source Vulnerability Management
  • Cyber Resilience Act
ISO27001-EN

About us

  • About Greenbone
  • Greenbone Group
  • Newsletter
  • License information
  • Privacy Statement
  • Terms & Conditions
ISO14001-EN

Contact with us

  • Contact
  • Media Contact
  • Careers
  • Partners
  • Security Response
  • Imprint

Community

  • Community Portal
  • Community Forum
© Copyright - Greenbone AG 2020-2025
  • Link to LinkedIn
  • Link to Mail
Scroll to top Scroll to top Scroll to top