Aggregator
CVE-2024-36936 | Linux Kernel up to 6.8.9 accept_memory denial of service (781e34b73601/1c5a1627f481 / Nessus ID 207884)
CVE-2024-27012 | Linux Kernel up to 6.8.7/6.9-rc4 nf_tables nft_mapelem_activate memory leak (86658fc7414d/e79b47a8615d / Nessus ID 207817)
贷款应用程序可能会让你处于危险之中:尼日利亚金融科技公司泄露了近846000名客户的信息数据!
上线一年拿下 3000 万日活,2024 年增长最快的 App 是怎么诞生的?
兩岸領導人國慶演說全文(2024年)
watchTowr raises $19 million to accelerate global growth
watchTowr announced a $19 million Series A funding round led by Peak XV, formerly known as Sequoia India & Southeast Asia, with repeat participation from Prosus Ventures and Cercano Management. The company will use the funds to capture market leadership and accelerate global growth by expanding its go-to-market, research and engineering teams. The latest investment brings its total funding raised to $29 million. Over the past year, watchTowr has seen significant adoption from critical infrastructure … More →
The post watchTowr raises $19 million to accelerate global growth appeared first on Help Net Security.
Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680)
Mozilla has pushed out an emergency update for its Firefox and Firefox ESR browsers to fix a vulnerability (CVE-2024-9680) that is being exploited in the wild. About CVE-2024-9680 Reported by ESET malware researcher Damien Schaeffer, CVE-2024-9680 is a use-after-free vulnerability in the browser’s Animation timelines and, according to Mozilla, has been exploited to achieve code execution in the content process. Additional details about the vulnerability or the attacks are yet to be shared. According to … More →
The post Actively exploited Firefox zero-day fixed, update ASAP! (CVE-2024-9680) appeared first on Help Net Security.
Ложный старт: кнопка «Пуск» оказалась трояном для 28 000 пользователей
Firefox Zero-Day Under Attack: Update Your Browser Immediately
简单聊聊网络空间测绘纵横之道
Experts Warn of Critical Unpatched Vulnerability in Linear eMerge E3 Systems
新加坡《个人数据保护法》全文翻译
基于泄露的 Kryptina 代码的新型 Mallox 勒索软件 Linux 变种
GEEKCON 2024 上海站赛程议题公布(内含送票活动)
Fivecast Discovery drives better analytical outputs
Responding directly to an increased global threat environment, Fivecast launched a Discovery solution that empowers analysts and investigators across both the Government and Corporate sectors to uncover intelligence insights faster to help protect communities and businesses. Fivecast Discovery automates and accelerates the processes of digital footprinting, information verification and identity resolution. These capabilities significantly enhance the crucial initial stages of intelligence investigations which can typically be impeded by huge data volumes, complex threats and resource … More →
The post Fivecast Discovery drives better analytical outputs appeared first on Help Net Security.
Критические уязвимости в Fortinet и Ivanti ставят под угрозу безопасность США
Best Practices to Configure BIG-IP LTM Systems to Encrypt HTTP Persistence Cookies
CISA has observed cyber threat actors leveraging unencrypted persistent cookies managed by the F5 BIG-IP Local Traffic Manager (LTM) module to enumerate other non-internet facing devices on the network. F5 BIG-IP is a suite of hardware and software solutions designed to manage and secure network traffic. A malicious cyber actor could leverage the information gathered from unencrypted persistence cookies to infer or identify additional network resources and potentially exploit vulnerabilities found in other devices present on the network.
CISA urges organizations to encrypt persistent cookies employed in F5 BIG-IP devices and review the following article for details on how to configure the BIG-IP LTM system to encrypt HTTP cookies. Additionally, F5 has developed an iHealth heuristic to detect and alert customers when cookie persistence profiles do not have encryption enabled. BIG-IP iHealth is a diagnostic tool that "evaluates the logs, command output, and configuration of a BIG-IP system against a database of known issues, common mistakes, and published F5 best practices" to help users verify the optimal operation of their BIG-IP systems.
CISA Releases Twenty-One Industrial Control Systems Advisories
CISA released twenty-one Industrial Control Systems (ICS) advisories on October 10, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-284-01 Siemens SIMATIC S7-1500 and S7-1200 CPUs
- ICSA-24-284-02 Siemens Simcenter Nastran
- ICSA-24-284-03 Siemens Teamcenter Visualization and JT2Go
- ICSA-24-284-04 Siemens SENTRON PAC3200 Devices
- ICSA-24-284-05 Siemens Questa and ModelSim
- ICSA-24-284-06 Siemens SINEC Security Monitor
- ICSA-24-284-07 Siemens JT2Go
- ICSA-24-284-08 Siemens HiMed Cockpit
- ICSA-24-284-09 Siemens PSS SINCAL
- ICSA-24-284-10 Siemens SIMATIC S7-1500 CPUs
- ICSA-24-284-11 Siemens RUGGEDCOM APE1808
- ICSA-24-284-12 Siemens Sentron Powercenter 1000
- ICSA-24-284-13 Siemens Tecnomatix Plant Simulation
- ICSA-24-284-14 Schneider Electric Zelio Soft 2
- ICSA-24-284-15 Rockwell Automation DataMosaix Private Cloud
- ICSA-24-284-16 Rockwell Automation DataMosaix Private Cloud
- ICSA-24-284-17 Rockwell Automation Verve Asset Manager
- ICSA-24-284-18 Rockwell Automation Logix Controllers
- ICSA-24-284-19 Rockwell Automation PowerFlex 6000T
- ICSA-24-284-20 Rockwell Automation ControlLogix
- ICSA-24-284-21 Delta Electronics CNCSoft-G2
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.