A new Interim Final Rule on Artificial Intelligence Diffusion issued in the US strengthens security, streamlines chip sales and prevents misuse of AI technology
Russia-linked threat actor UAC-0063 targets Kazakhstan to gather economic and political intelligence in Central Asia. Russia-linked threat actors UAC-0063 is targeting Kazakhstan as part of a cyber espionage campaign to gather economic and political intelligence in Central Asia. The Computer Emergency Response Team of Ukraine (CERT-UA) first detailed the activity of UAC-0063 in early 2023. […]
The U.S. Department of Justice announced today that the FBI has deleted Chinese PlugX malware from over 4,200 computers in networks across the United States. [...]
The U.S. Department of Justice announced today that the FBI has deleted Chinese PlugX malware from over 4,200 computers in networks across the United States. [...]
A vulnerability classified as critical has been found in Tenda FH1202 1.2.0.14(408). Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument mac leads to stack-based buffer overflow.
This vulnerability is traded as CVE-2024-2987. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
The vendor was contacted early about this disclosure but did not respond in any way.
The vendor was contacted early about this disclosure but did not respond in any way.
A vulnerability was found in Siemens SIMATIC PCS, SIMATIC WinCC Runtime Professional and SIMATIC WinCC up to 9.1. It has been classified as critical. Affected is an unknown function of the component Login Dialog Box. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2023-50821. An attack has to be approached locally. There is no exploit available.
It is recommended to apply a patch to fix this issue.
A vulnerability classified as critical was found in Linux Kernel up to 5.15.4. Affected by this vulnerability is the function cs_desc of the component ALSA. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2021-47211. The attack needs to be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Linux Kernel up to 4.19.217/5.4.161/5.10.81/5.15.4. Affected is the function set_hv_tscchange_cb of the component hyperv. The manipulation leads to null pointer dereference.
This vulnerability is traded as CVE-2021-47217. The attack can only be done within the local network. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability has been found in Linux Kernel up to 5.10.81/5.15.4 and classified as critical. Affected by this vulnerability is the function hashtab_init of the component SELinux. The manipulation leads to null pointer dereference.
This vulnerability is known as CVE-2021-47218. The attack can only be initiated within the local network. There is no exploit available.
It is recommended to upgrade the affected component.