Rankiteo Blog
  • Blog Home Page
  • Website Home Page
  • About
Sign in Sign up
Sign up Sign in
  • Blog Home Page
  • Website Home Page
  • About
  • Data & privacy
  • Contact
Unlock full access to see the entire library by subscribing to a paid plan.
Sign up
Bookmarks

Vulnerability

1258 posts
UNISOC
Vulnerability cyber

UNISOC

public – 1 min read
A critical security flaw uncovered in UNISOC's smartphone chipset could potentially be weaponized to disrupt a smartphone'…
Jul 3, 2022
Jeremy C Jeremy C
Atlassian
Vulnerability cyber

Atlassian

public – 1 min read
Atlassian warned its customers that multiple threat groups are exploiting a Confluence Server zero-day vulnerability in its servers. Any unauthenticated…
Jul 3, 2022
Jeremy C Jeremy C
Eden District Municipality
Vulnerability cyber

Eden District Municipality

public – 1 min read
The personal information of about 3,700 Ede residents was accessed by unauthorized persons due to a security vulnerability on…
Jun 22, 2022
Jeremy C Jeremy C
National Stores Inc.
Vulnerability cyber

National Stores Inc.

public – 1 min read
National Stores, Inc. has been the victim of a malware attack. It enabled unauthorized parties to access payment card information.…
Jun 22, 2022
Jeremy C Jeremy C
GreenBay
Vulnerability cyber

GreenBay

public – 1 min read
A local business’s computer network was hacked Money and information were stolen. Hackers used a known vulnerability to get…
Jun 22, 2022
Jeremy C Jeremy C
OnePlus
Vulnerability cyber

OnePlus

public – 3 min read
A critical vulnerability (CVE-2025-10184) in OxygenOS (versions 12 to 15) on OnePlus devices exposes SMS data and metadata to any…
Jun 16, 2022
Jeremy C Jeremy C
Microsoft Cloud
Vulnerability cyber

Microsoft Cloud

public – 1 min read
A critical vulnerability in Microsoft's Azure Automation service could have permitted unauthorized access to other Azure customer accounts.…
Jun 3, 2022
Jeremy C Jeremy C
Coincheck
Vulnerability cyber

Coincheck

public – 1 min read
Japanese cryptocurrency exchange Coincheck lost 58 billion yen ($530 million) It has been dubbed the biggest cryptocurrency heist ever recorded.…
Jun 1, 2022
Jeremy C Jeremy C
LeapFrog
Vulnerability cyber

LeapFrog

public – 1 min read
LeapFrog, a popular children’s toy making company was susceptible to a variety of attacks that leverage Adobe Flash vulnerabilities.…
May 22, 2022
Jeremy C Jeremy C
AirDroid Business
Vulnerability cyber

AirDroid Business

public – 1 min read
Millions of AirDroid,a device manager app users were left vulnerable to phone data hijacking attacks. Any attacker could exploit…
May 19, 2022
Jeremy C Jeremy C
Twitter
Vulnerability cyber

Twitter

public – 1 min read
A bug in Twitter about how it handles password reminders allowed users to take control of other accounts such as…
May 18, 2022
Jeremy C Jeremy C
Microsoft Cloud
Vulnerability cyber

Microsoft Cloud

public – 1 min read
Microsoft mitigated a security flaw affecting Azure Synapse and Azure Data Factory that could lead to Any malicious actor could…
May 13, 2022
Jeremy C Jeremy C
Ready to get started now?
Subscribe to get access to premium content or contact us if you have any questions.
Subscribe Contact us
Rankiteo Blog
Every risk at your fingertips
Navigation
  • Blog Home Page
  • Website Home Page
  • About
Quick links
  • Data & privacy
  • Contact
Tags
cyber Breach Ransomware Cyber Attack Vulnerability
©2026 Rankiteo Blog. Published with Ghost & Dashi.
Great! Next, complete checkout for full access to Rankiteo Blog.
Welcome back! You've successfully signed in.
You've successfully subscribed to Rankiteo Blog.
Success! Your account is fully activated, you now have access to all content.
Success! Your billing info has been updated.
Your billing was not updated.