Skip to content

Knowledge Base

Over 982 articles from nFlo experts. Learn more about cybersecurity, IT infrastructure, cloud and compliance.

Latest Articles

View all
Security Alerts Mar 11, 2026

CVE-2025-68613: High-Risk n8n Vulnerability (EPSS: 79%)

n8n contains an improper control of dynamically managed code resources vulnerability in its workflow expression evaluation system that allows for remote code execution....

Security Alerts Mar 9, 2026

CVE-2021-22054: 2021 Vulnerability Now Actively Exploited (Omnissa)

Omnissa Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send t...

Security Alerts Mar 9, 2026

CVE-2025-26399: SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability

SolarWinds Web Help Desk contain a deserialization of untrusted data vulnerability in AjaxProxy that could allow an attacker to run commands on the host machine....

Security Alerts Mar 9, 2026

CVE-2026-1603: Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability

Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential d...

Security Alerts Mar 5, 2026

CVE-2017-7921: 2017 Vulnerability Now Actively Exploited (Hikvision)

Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information....

Security Alerts Mar 5, 2026

CVE-2021-22681: 2021 Vulnerability Now Actively Exploited (Rockwell)

Multiple Rockwell products contain an insufficient protected credentials vulnerability. Studio 5000 Logix Designer software may allow a key to be discovered. This key is used to verify Logix controlle...

Stay Updated

Subscribe to our newsletter and receive the latest articles about cybersecurity and IT.

By subscribing, you agree to receive our newsletter. You can unsubscribe at any time.

Want to Reduce IT Risk and Costs?

Book a free consultation - we respond within 24h

Response in 24h Free quote No obligations

Or download free guide:

Download NIS2 Checklist