Arab Security Consultants

  • Home
  • Courses
    • EC-Council Programs
    • EC-Council iWeek Courses
    • PECB
      • ISO/IEC 27001 Lead Implementer
      • ISO/IEC 27001 Lead Auditor
    • Cyber Book
  • Organized Events
    • Arab Security Conference
    • Arab Security Cyber WarGames
  • Services
    • CodeRed
    • OhPhish
    • Risk Assessment
    • Social Engineering
    • Identity & Access Security
    • Vulnerability Assessment
    • Penetration Testing
  • Training centers
  • EC-Council with ASC
  • News
  • Contact Us
  • Home
  • Posts tagged "vulnerability management"

Tag: vulnerability management

Hackers Exploiting Triofox Flaw to Install Remote Access Tools via Antivirus Feature

Tuesday, 11 November 2025 by Ayman Hamam

Google’s Mandiant Threat Defense on Monday said it discovered n-day exploitation of a now-patched security flaw in Gladinet’s Triofox file-sharing and remote access platform. The critical vulnerability, tracked as CVE-2025-12480 (CVSS score: 9.1), allows an attacker to bypass authentication and access the configuration pages, resulting in the upload and execution of arbitrary payloads. The tech giant said it observed

  • Published in News
Tagged under: Antivirus Bypass, AnyDesk, ASC, Code Execution, CVE-2025-12480, Cyber Attack, Cyber Defense, Cyber Security, Digital Forensics, Exploit Alert, Gladinet, Google Mandiant, InfoSec, Malware Analysis, Mandiant, Patch Management, Patch Now, Plink, privilege escalation, PuTTY, RDP Attack, Remote Access, Security Update, SSH Tunnel, Threat Hunting, Threat Intelligence, Triofox, UNC6485, vulnerability management, Zoho Assist, Zoho UEMS

Three Ways To Supercharge Your Software Supply Chain Security

Sunday, 07 January 2024 by Ayman Hamam

Section four of the “Executive Order on Improving the Nation’s Cybersecurity” introduced a lot of people in tech to the concept of a “Software Supply Chain” and securing it. If you make software and ever hope to sell it to one or more federal agencies, you have to pay attention to this. Even if you never plan

  • Published in News
Tagged under: cyberSecurity, ethical hacking, secrets management, secure coding, software composition analysis, software development, software supply chain security, supply chain resilience., vulnerability management
  • Home
  • Contact Us
  • Services
  • Training Centers
  • GET SOCIAL

Arab Security Consultants | Copyright © 2023 All rights reserved.

TOP