Aggregator
CVE-2024-20103 | MediaTek MT8893 WLAN Firmware out-of-bounds write (MSV-1599 / ALPS09001358)
CVE-2024-20102 | MediaTek MT8893 WLAN Driver out-of-bounds (MSV-1601 / ALPS08998892)
CVE-2024-20101 | MediaTek MT8796 WLAN Driver out-of-bounds write (MSV-1602 / ALPS08998901)
CVE-2024-20100 | MediaTek MT8796 WLAN Driver out-of-bounds write (MSV-1603 / ALPS08998449)
От ИИ до офлайн-защиты: Google представляет тройную систему безопасности для Android
Темная сторона гениальности: Как аутизм и киберпреступность переплелись в судьбе Ариона Куртая
U.S. CISA adds Synacor Zimbra Collaboration flaw to its Known Exploited Vulnerabilities catalog
Salt Typhoon: китайские шпионы проникли в сердце инфраструктуры США
The case for enterprise exposure management
For several years, external attack surface management (EASM) has been an important focus for many security organizations and the vendors that serve them. EASM, attempting to discover the full extent of an organization’s external attack surface and remediate issues, had broad purview, targeting software vulnerabilities, misconfigurations and neglected shadow IT assets from the outside-in. The focus on greater attack surface visibility and external asset awareness resonated with CISOs, CIOs and practitioners alike. Recently, a new … More →
The post The case for enterprise exposure management appeared first on Help Net Security.
19.6K+ Public Zimbra Installations Vulnerable to Code Execution Attacks – CVE-2024-45519
A critical vulnerability in Zimbra’s postjournal service, identified as CVE-2024-45519, has left over 19,600 public Zimbra installations exposed to remote code execution attacks. This vulnerability, with a CVSS score of 9.8, allows unauthenticated attackers to execute arbitrary commands on affected Zimbra installations, posing a significant threat to the security and integrity of these systems. Scans […]
The post 19.6K+ Public Zimbra Installations Vulnerable to Code Execution Attacks – CVE-2024-45519 appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Transforming cloud security with real-time visibility
In this Help Net Security interview, Amiram Shachar, CEO at Upwind, discusses the complexities of cloud security in hybrid and multi-cloud environments. He outlines the need for deep visibility into configurations and real-time insights to achieve a balance between agility and security. Shachar also shares strategies for addressing misconfigurations and ensuring compliance, recommending a proactive approach to risk management in cloud deployments. With hybrid and multi-cloud setups becoming the norm, cloud environments are getting more … More →
The post Transforming cloud security with real-time visibility appeared first on Help Net Security.
境外僵尸网络攻击溯源与样本分析
恶意代码技术及恶意代码检测技术原理与实现
守护网络安全:从日常生活做起的防护策略
2024高校网络安全管理运维赛 wp - 渗透测试中心
2024熵密杯wp - 渗透测试中心
Rspamd: Open-source spam filtering system
Rspamd is an open-source spam filtering and email processing framework designed to evaluate messages based on a wide range of rules, including regular expressions, statistical analysis, and integrations with custom services like URL blacklists. The system analyzes each message and assigns a verdict, which the MTA can use to take further actions, such as rejecting the message or adding a spam indicator header. Additionally, Rspamd provides valuable information like potential DKIM signatures and suggested message … More →
The post Rspamd: Open-source spam filtering system appeared first on Help Net Security.
SOC teams are frustrated with their security tools
Security operations center (SOC) practitioners believe they are losing the battle detecting and prioritizing real threats – due to too many siloed tools and a lack of accurate attack signal, according to Vectra AI. They cite a growing distrust in vendors, believing their tools can be more of a hindrance than help in spotting real attacks. This is at odds with growing confidence in their teams’ abilities and a sense of optimism around the promise … More →
The post SOC teams are frustrated with their security tools appeared first on Help Net Security.