Estimated reading time: 3 minutes
Our previous blog explored an XSS vulnerability within the Bookly plugin (WordPress Online Booking and Scheduling Plugin – Bookly). Today, we will delve into another XSS vulnerability that came to light during our research on the same plugin. Our...![Healthcare on High Alert: The Alarming Rise of Cyberattacks on eInfra Sends Shockwaves Through the Industry – Are You Safe?](https://www.seqrite.com/blog/wp-content/uploads/2023/04/Seqrite_blog-healthcare2-150x110.png)
Estimated reading time: 3 minutes
The world of healthcare is rapidly changing. Technological advancements expose organizations to cyber risks, including ransomware, malware, breaches, viruses, and vulnerabilities. The combination of poor cybersecurity practices, digital transformation in care delivery, operational touchpoints, and sensitive data storage makes...![CVE-2022-30190: Zero-day vulnerability “Follina” in MSDT exploited in the wild](https://www.seqrite.com/blog/wp-content/uploads/2022/06/Follina-detailed-Analysis-150x110.jpg)
Estimated reading time: 5 minutes
On May 30, 2022, CVE-2022-30190 “FOLLINA,” a zero-day remote code execution vulnerability discovered in Microsoft Windows Support Diagnostic Tool (MSDT) with high severity (CVSS:9.3). This MSDT tool diagnoses issues with applications such as Microsoft Office documents. Initial attack vector...![Spring4Shell: Zero-Day vulnerability CVE-2022-22965 in Spring Framework](https://www.seqrite.com/blog/wp-content/uploads/2022/04/Spring4shell-SQ-150x110.jpg)
Estimated reading time: 2 minutes
A Zero-day Remote Code Execution Vulnerability with critical severity has been identified as CVE-2022-22965 aka Spring4Shell or SpringShell in Spring Framework versions 5.3.0 to 5.3.17, 5.2.0 to 5.2.19 & older. The Spring Framework is an open-source, popular, feature-rich application...![Top 6 cybersecurity threats that every Startup or Business should have to be ready to fight in current times](https://www.seqrite.com/blog/wp-content/uploads/2021/12/Top-6-cybersecurity-threats-to-address-in-2021-150x110.jpg)
Estimated reading time: 4 minutes
If you’ve been following the news recently, you’ll undoubtedly have read about cybersecurity incidents impacting corporations of all sizes in all industries around the world. While it doesn’t often make the news, even small- and medium-sized businesses (SMBs) have...![Eight great habits that enterprises can practice for bolstering cybersecurity](https://www.seqrite.com/blog/wp-content/uploads/2019/09/Great-habits-for-enterprises-to-cultivate-for-a-stronger-cybersecurity-ecosystem-150x110.jpg)
Estimated reading time: 3 minutes
Efficient cybersecurity is built on the foundation of good habits practised by internal customers. Enterprises may think a great deal about implementing effective cybersecurity practices and have plenty of meetings, but it’s actually not that complicated. An effective framework...