Aggregator
CVE-2015-7043 | Apple iOS up to 9.1 Kernel denial of service (HT205635 / EDB-38917)
Мошенники освоили тактику «второго шанса»: как не попасть в ловушку
2024双11,VMware 宣布虚拟机产品 Workstation Pro 和 Fusion Pro 对所有人免费,包括商用
CVE-2017-1000353 | Jenkins up to 2.46.1/2.56 deserialization (Advisory 159266 / EDB-41965)
Утечка данных? Страховка возместит: новая защита россиян с 2025 года
Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks
Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clouds. While traditional networks, including SD-WAN and site-to-site VPN, have extended enterprise connectivity to branches and clouds, they have also inadvertently accelerated the spread of ransomware. Although firewalls are used to do segmentation on networks, they add complexity, increase costs, and … More →
The post Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks appeared first on Help Net Security.
CVE-2024-49557 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x command injection (dsa-2024-425)
CVE-2024-48838 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x file access (dsa-2024-425)
CVE-2024-49395 | NeoMutt Header Field Bcc information disclosure
CVE-2024-10695 | Futurio Extra Plugin up to 2.0.13 on WordPress Post information disclosure
CVE-2024-10672 | Multiple Page Generator Plugin up to 4.0.2 on WordPress path traversal
5600 глаз: американец раскрыл масштабы тотальной слежки по всему миру
Black Suit
Apple indeed added a feature called “inactivity reboot” in iOS 18.1 that reboots locked devices
CVE-1999-0219 | Cat Soft Serv-U 2.5 memory corruption (EDB-19218 / Nessus ID 10089)
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2021-26086 Atlassian Jira Server and Data Center Path Traversal Vulnerability
- CVE-2014-2120 Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability
- CVE-2021-41277 Metabase GeoJSON API Local File Inclusion Vulnerability
- CVE-2024-43451 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
- CVE-2024-49039 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA, FBI, NSA, and International Partners Release Joint Advisory on 2023 Top Routinely Exploited Vulnerabilities
Today, the Cybersecurity and Infrastructure Security Agency (CISA), the Federal Bureau of Investigation (FBI), National Security Agency (NSA), and international partners released joint Cybersecurity Advisory, 2023 Top Routinely Exploited Vulnerabilities.
This advisory supplies details on the top Common Vulnerabilities and Exposures (CVEs) routinely exploited by malicious cyber actors and their associated Common Weakness Enumeration(s) (CWE) to help organizations better understand the impact of exploitation. International partners contributing to this advisory include:
- Australian Signals Directorate’s Australian Cyber Security Centre
- Canadian Centre for Cyber Security
- New Zealand National Cyber Security Centre and New Zealand Computer Emergency Response Team
- United Kingdom’s National Cyber Security Centre
The authoring agencies urge all organizations to review and implement the recommended mitigations detailed in this advisory. The advisory provides vendors, designers, and developers a guide for implementing secure by design and default principles and tactics to reduce the prevalence of vulnerabilities in their software and end-user organizations mitigations. Following this guidance will help reduce the risk of compromise by malicious cyber actors.
Vendors and developers are encouraged to take appropriate steps to provide products that protect their customers’ sensitive data. To learn more about secure by design principles and practices, visit CISA’s Secure by Design.
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on November 12, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-317-01 Subnet Solutions PowerSYSTEM Center
- ICSA-24-317-02 Hitachi Energy TRO600
- ICSA-24-317-03 Rockwell Automation FactoryTalk View ME
- ICSA-23-306-03 Mitsubishi Electric MELSEC Series (Update A)
- ICSA-23-136-01 Snap One OvrC Cloud (Update A)
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
Citrix Releases Security Updates for NetScaler and Citrix Session Recording
Citrix released security updates to address multiple vulnerabilities in NetScaler ADC, NetScaler Gateway, and Citrix Session Recording. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following and apply necessary updates: