Aggregator
关注 | 全国数据工作会议在京召开
发布 | 四部门联合印发《关于促进数据标注产业高质量发展的实施意见》(附全文)
全球视野 | 国际网安快讯(第45期)
CVE-2024-52938 | Imagination Technologies Graphics DDK up to 24.2 RTM2 GPU Firmware out-of-range pointer offset
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
⚡ THN Weekly Recap: Top Cybersecurity Threats, Tools and Tips [13 January]
Microsoft Takes Legal Action Against AI “Hacking as a Service” Scheme
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-12686 BeyondTrust Privileged Remote Access (PRA) and Remote Support (RS) OS Command Injection Vulnerability
- CVE-2023-48365 Qlik Sense HTTP Tunneling Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA and US and International Partners Publish Guidance on Priority Considerations in Product Selection for OT Owners and Operators
Today, CISA—along with U.S. and international partners—released joint guidance Secure by Demand: Priority Considerations for Operational Technology Owners and Operators when Selecting Digital Products. As part of CISA’s Secure by Demand series, this guidance focuses on helping customers identify manufacturers dedicated to continuous improvement and achieving a better cost balance, as well as how Operational Technology (OT) owners and operators should integrate secure by design elements into their procurement process.
Critical infrastructure and industrial control systems are prime targets for cyberattacks. The authoring agencies warn that threat actors, when compromising OT components, target specific OT products rather than specific organizations. Many OT products are not designed and developed with Secure by Design principles and often have easily exploited weaknesses. When procuring products, OT owners and operators should select products from manufacturers who prioritize security elements identified in this guidance.
For more information on questions to consider during procurement discussions, see CISA’s Secure by Demand Guide: How Software Customers Can Drive a Secure Technology Ecosystem. To learn more about secure by design principles and practices, visit Secure by Design.
WEF Warns of Growing Cyber Inequity Amid Escalating Complexities in Cyberspace
CVE-2024-11396 | Event Monster Plugin up to 1.4.3 on WordPress Visitors List Export information disclosure
西班牙电信公司确认数据泄露后内部票务系统遭到破坏
Ransomware on ESXi: The Mechanization of Virtualized Attacks
Ransomware on ESXi: The mechanization of virtualized attacks
Alleged Blender, Sinbad cryptomixer operators arrested, indicted
Three Russian nationals have been indicted in the Northern District of Georgia for their alleged role as operators of cryptocurrency mixing (cryptomixer) services Blender.io and Sinbad.io. Roman Vitalyevich Ostapenko and Alexander Evgenievich Oleynik were arrested on Dec. 1, 2024, roughly a year after Sinbad.io’s online infrastructure was seized as part of a coordinated law enforcement action among the Netherlands’ Financial Intelligence and Investigative Service, Finland’s National Bureau of Investigation, and the FBI. The third defendant, … More →
The post Alleged Blender, Sinbad cryptomixer operators arrested, indicted appeared first on Help Net Security.
CVE-2024-47897 | Imagination Technologies Graphics DDK up to 24.2 RTM2 GPU System Call out-of-bounds write
Microsoft Warns of MFA Issue Affecting Microsoft 365 users
Microsoft has issued a warning regarding an ongoing issue with Multi-Factor Authentication (MFA) that is impacting some Microsoft 365 (M365) users. The problem, which surfaced earlier today, is preventing affected users from accessing certain M365 applications, raising concerns for businesses and individuals who rely on these services for essential operations. Microsoft flagged the issue via […]
The post Microsoft Warns of MFA Issue Affecting Microsoft 365 users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.