Critical Vulnerability in Drivers Affects Multiple Canon Printers The office printer could mete out more than ordinary frustration now that researchers discovered a vulnerability in drivers for Canon printer enabling attackers to execute arbitrary code. The flaw is an out-of-bounds vulnerability in Enhanced Metafile Recode processing.
Security Operations Firm Gets $3.4B Valuation, Expands AI Threat Detection Platform Security operations firm ReliaQuest announced more than $500 million in funding led by EQT, valuing the company at $3.4 billion. The investment will expand its GreyMatter platform and advance Agentic AI to speed threat response and reduce operational burdens on security teams.
Government Says Managed Service Providers Need More Regulation The British government pledged to introduce stricter rules surrounding incident reporting and supply chain vulnerability patching through legislation it previewed in July 2024. The proposed Cyber Security and Resilience Bill will bring under its scope managed service providers.
Industry Experts Testify Before Congressional Committee Examining Medical Devices Massive workforce cuts at the Food and Drug Administration could hinder the agency's critical work involving medical device cybersecurity, putting patient safety at risk and stiffing innovation, said some experts testifying during a Congressional hearing on Tuesday.
A vulnerability was found in Dark Age CMS 0.2c. It has been classified as critical. Affected is an unknown function of the file login.php of the component Login. The manipulation leads to sql injection.
This vulnerability is traded as CVE-2009-0326. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
Cybersecurity researchers have discovered an updated version of a malware loader called Hijack Loader that implements new features to evade detection and establish persistence on compromised systems.
"Hijack Loader released a new module that implements call stack spoofing to hide the origin of function calls (e.g., API and system calls)," Zscaler ThreatLabz researcher Muhammed Irfan V A said in
A vulnerability was found in Xiaomi Pro 13 and classified as problematic. This issue affects some unknown processing of the component Mimarket. The manipulation leads to cross site scripting.
The identification of this vulnerability is CVE-2024-4405. The attack may be initiated remotely. There is no exploit available.
A vulnerability was found in WP Video Lightbox Plugin up to 1.9.10 on WordPress. It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation of the argument width leads to cross site scripting.
This vulnerability is known as CVE-2024-4324. The attack can be launched remotely. There is no exploit available.
A vulnerability was found in 3D FlipBook Plugin up to 1.15.4 on WordPress. It has been classified as problematic. Affected is an unknown function of the component Bookmark URL Handler. The manipulation leads to cross site scripting.
This vulnerability is traded as CVE-2024-3883. It is possible to launch the attack remotely. There is no exploit available.
A vulnerability was found in LA-Studio Element Kit for Elementor Plugin up to 1.3.7.5 on WordPress. It has been rated as problematic. Affected by this issue is some unknown functionality of the component LaStudioKit Post Author Widget. The manipulation leads to cross site scripting.
This vulnerability is handled as CVE-2024-3005. The attack may be launched remotely. There is no exploit available.