ThreatDown Powered by Malwarebytes
  • Nebula support
  • OneView support
  • Nebula sign in
  • OneView sign in
  • Partner Portal sign in
    • Products

    • Endpoint Detection & Response (EDR)
    • Endpoint Protection
    • Vulnerability Assessment
    • Patch Management
    • Application Block
    • DNS Filtering
    • Mobile Security
    • Email Security
    • Services

    • Managed Detection & Response (MDR)
    • Managed Threat Hunting
    • Premium Support
    • Features

    • Browser Phishing Protection
    • Firewall Management
    • Security Advisor
    • Platforms

    • Nebula
    • Manage your organization’s endpoint security in a single-tenant console

      Nebula customer sign in >

    • OneView
    • Provides MSPs centralized visibility and management capabilities across customer sites

      OneView customer sign in >

    • Explore Partnerships
    • Review program benefits, innovative technology, channel first mentality

    • Managed Service Providers
    • Everything MSPs need to run their business seamlessly

    • Technology Partners
    • Explore our technology integrations

    • Resellers
    • Build growth, profitability, and customer loyalty

    • Retain and grow your business with tools, education, and support in the partner experience center.

      Sign in to PXC >

    • Threat Center
    • Learn about the latest threat news

    • Reports
    • Threat Detections
    • Executive POV
    • Glossary
    • Blog
    • Resource Center
    • Learn more about ThreatDown

    • ThreatDown News
    • Case Studies
    • Reviews
    • Cybersecurity Tips & Tricks
    • Webinars
    • About Us
    • 2025 State of Ransomware: Inside a record-breaking year of ransomware attacks
    • Discover a record-breaking year of attacks where ransomware became decentralized and unpredictable, spreading further than ever before.

      Download now >

    Pricing
    • Why ThreatDown

    • About Us
    • ThreatDown vs. Competition
    • Case Studies
    • ThreatDown named Product of the Year by MRG Effitas.

      Learn more >

    Get a quote
    Buy now
    Home > Blog

    vulnerability

    Connectwise

    Update now! ConnectWise ScreenConnect vulnerability needs your attention

    ConnectWise customers need to take immediate action to remediate a critical vulnerability.
    1 minute
    Joomla logo

    Joomla! vulnerability is being actively exploited

    A vulnerability in the popular Joomla! CMS has been added to CISA's known exploited vulnerabilities catalog.
    2 minutes
    F5 BIG-IP logo

    Patch now! BIG-IP Configuration utility is vulnerable for an authentication bypass

    F5 has warned customers about a critical vulnerability impacting BIG-IP that could result in unauthenticated remote code execution.
    2 minutes
    Citrix ShareFile logo

    Patch now! Citrix Sharefile joins the list of actively exploited file sharing software

    2 minutes
    Zimbra logo

    Act now! In-the-wild Zimbra vulnerability needs a workaround

    2 minutes
    Mastodon

    “TootRoot” Mastodon vulnerabilities fixed: Admins, patch now!

    2 minutes
    VMware

    Update now: Critical flaw in VMWare Fusion and VMWare Workstation

    2 minutes
    Microsoft Azure Service Fabric logo

    Super FabriXss: an RCE vulnerability in Azure Service Fabric Explorer

    3 minutes
    Submerged

    Hive! Hive! Hive! Ransomware site submerged by FBI

    2 minutes
    OpenSSLv3 critical fix

    Critical OpenSSL fix due Nov 1—what you need to know

    2 minutes
    Cyber security concept with shield symbol, privacy protection and computer safety icon. Futuristic abstract 3d rendering illustration.

    CISA Log4Shell warning: Patch VMware Horizon installations immediately

    3 minutes
    Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs)

    Introducing Malwarebytes Vulnerability Assessment for OneView: How to check for Common Vulnerabilities and Exposures (CVEs)

    1 minute

    Vulnerabilities Away, it’s Patch Tuesday!

    1 minute

    Categories

    Breaches
    Product News
    Ransomware
    Threat Intelligence
    Vulnerabilities
    X (formerly Twitter)
    YouTube
    ThreatDown Powered by Malwarebytes

    Products & Services

    Endpoint Detection & Response
    Endpoint Protection
    Managed Detection & Response
    Pricing

    Partners

    MSP Partner Program
    Reseller Partner Program
    Technology Partners
    Become a Partner

    Managed Services Terms & Conditions

    Managed Service Terms
    MTH Service Description
    MDR Service Description

    Resources

    Threat Center
    Resource Center
    Blog
    Glossary

    Support

    Nebula Support
    OneView Support

    Company

    About Us
    Press
    Careers

    Get in Touch

    Contact Us
    Schedule a Meeting
    Request a Demo

    ThreatDown Newsletter

    Get cybersecurity news and tips from our security experts in your mailbox.

  • Legal
  • Privacy
  • Accessibility
  • Compliance Certifications
  • Vulnerability Disclosure
  • Terms of Service
  • © 2025 All Rights Reserved