Aggregator
CVE-2024-13159 | Ivanti Endpoint Manager absolute path traversal (Nessus ID 214343)
CVE-2024-13161 | Ivanti Endpoint Manager absolute path traversal (Nessus ID 214343)
CVE-2024-55550 | Mitel MiCollab up to 9.8 SP2 information disclosure (Nessus ID 233866)
CVE-2024-12686 | BeyondTrust Remote Support & Privileged Remote Access up to 24.3.1 os command injection (Nessus ID 213464)
CVE-2024-3393 | Palo Alto Networks Cloud NGFW/PAN-OS DNS Security unusual condition
CVE-2024-12987 | DrayTek Vigor2960/Vigor300B 1.5.1.4 Web Management Interface apmcfgupload session os command injection
CVE-2024-11120 | GeoVision GV-VS12/GV-VS11/GV-DSP_LPR_V3/GVLX 4 V2/GVLX 4 V3 os command injection
CVE-2024-44308 | Apple Safari on Intel Web Content Remote Code Execution (Nessus ID 211691)
CVE-2024-44308 | Apple macOS on Intel Web Content Remote Code Execution (Nessus ID 211691)
CVE-2024-44308 | Apple iOS/iPadOS on Intel Web Content Remote Code Execution (Nessus ID 211691)
CVE-2024-44308 | Apple visionOS on Intel Web Content Remote Code Execution (Nessus ID 211691)
MITRE ATT&CK is Deprecating a Tactic: 3 Takeaways from the “Defense Evasion” Break-up
MITRE ATT&CK v18 is deprecating Defense Evasion (TA0005). Learn about the new Stealth and Impair Defenses tactics and what SOC teams need to do next.
The post MITRE ATT&CK is Deprecating a Tactic: 3 Takeaways from the “Defense Evasion” Break-up appeared first on D3 Security.
The post MITRE ATT&CK is Deprecating a Tactic: 3 Takeaways from the “Defense Evasion” Break-up appeared first on Security Boulevard.
TP-Link warns of critical command injection flaw in Omada gateways
Cavalry Werewolf APT Hackers Attacking Multiple Industries with FoalShell and StallionRAT
A sophisticated threat campaign has emerged targeting Russia’s public sector and critical industries between May and August 2025. The Cavalry Werewolf APT group, also known as YoroTrooper and Silent Lynx, has been actively deploying custom-built malware toolsets through highly targeted phishing operations that exploit trusted governmental relationships. The campaign focuses on organizations within energy, mining, […]
The post Cavalry Werewolf APT Hackers Attacking Multiple Industries with FoalShell and StallionRAT appeared first on Cyber Security News.
Defakto Raises $30.75M to Lead Non-Human Identity Space
With $30.75 million in Series B funding, Defakto aims to strengthen non-human identity security across AI workloads and cloud platforms. The Silicon Valley-based startup plans to deepen discovery, governance and enterprise integrations, while expanding its go-to-market strategy.
Russian Disinformation Followed Drone Incursion of Poland
After Russian drones violated Polish airspace last month, multiple pro-Kremlin information operations teams sprang into action to advance pro-Moscow narratives that distorted the facts, as part of a hybrid operation designed to destabilize Poland, and NATO support for Ukraine, said experts.
Defakto Raises $30.75M to Lead Non-Human Identity Space
With $30.75 million in Series B funding, Defakto aims to strengthen non-human identity security across AI workloads and cloud platforms. The Silicon Valley-based startup plans to deepen discovery, governance and enterprise integrations, while expanding its go-to-market strategy.
Russian Disinformation Followed Drone Incursion of Poland
After Russian drones violated Polish airspace last month, multiple pro-Kremlin information operations teams sprang into action to advance pro-Moscow narratives that distorted the facts, as part of a hybrid operation designed to destabilize Poland, and NATO support for Ukraine, said experts.
How Adaptable is Your Secrets Security Strategy?
Are You Safeguarding Non-Human Identities Effectively in Your Cloud Environment? Enterprises often ask whether their secrets security strategy is truly adaptable. Traditionally, cybersecurity has revolved around human identities, but the rise of digital transformation has cast a spotlight on Non-Human Identities (NHIs). These machine identities, comprising encrypted secrets such as tokens or keys, serve as […]
The post How Adaptable is Your Secrets Security Strategy? appeared first on Entro.
The post How Adaptable is Your Secrets Security Strategy? appeared first on Security Boulevard.