Aggregator
CVE-2023-23443 | Honor Magic OS 7.0.0.129 information disclosure
CVE-2022-46487 | Scontain SCONE up to 5.7.x Floating Point __scone_entry observable behavioral discrepancy
CVE-2023-50651 | Totolink X6000R 9.4.0cu.852_B20230719 /cgi-bin/cstecgi.cgi os command injection
CVE-2021-46900 | Sympa up to 6.2.61 cookie protection mechanism (Issue 1091)
CVE-2023-32874 | MediaTek MT6990 Modem IMS Stack out-of-bounds write (MOLY01161803)
CVE-2023-32885 | MediaTek MT8798 Display DRM memory corruption (ALPS07780685)
CVE-2023-47458 | SpringBlade up to 3.7.0 permission
Unlocking Near-Zero Downtime Patch Management With High Availability Clustering
Using high availability (HA) clustering to test patches and updates more easily and to apply them in production environments with near-zero application downtime.
The post Unlocking Near-Zero Downtime Patch Management With High Availability Clustering appeared first on Security Boulevard.
CVE-2024-26196 | Microsoft Edge up to 122.0.2365.52 on Android information disclosure
CVE-2024-25167 | eblog 1.0 Comment description cross site scripting
CVE-2024-2063 | SourceCodester Petrol Pump Management Software 1.0 profile_crud.php Username cross site scripting
CVE-2024-2065 | SourceCodester Barangay Population Monitoring System up to 1.0 update-resident.php full_name cross site scripting
Securing digital products under the Cyber Resilience Act
In this Help Net Security interview, Dr. Dag Flachet, co-founder at Codific, explains what the Cyber Resilience Act (CRA) means for companies and how it compares to GDPR in terms of regulatory complexity and impact on organizations. He discusses the technical and procedural challenges posed by CRA, particularly in secure software development, and highlights the role of frameworks like OWASP SAMM in conducting readiness assessments. In your view, how does the CRA compare to GDPR … More →
The post Securing digital products under the Cyber Resilience Act appeared first on Help Net Security.
JVN: 複数のSchneider Electric製品における複数の脆弱性
FreeBuf早报 | Windows NTLM 漏洞遭多次利用;Chrome扩展暗藏追踪代码
The Urgent Need for Tokenizing Personally Identifiable Information
If we want privacy, trust and resilience in our digital infrastructure, tokenization is no longer optional. It’s essential.
The post The Urgent Need for Tokenizing Personally Identifiable Information appeared first on Security Boulevard.
CVE-2018-16606 | ProConf up to 6.0 pid information disclosure (ID 149259 / EDB-52236)
When ransomware strikes, what’s your move?
Should we negotiate? Should we pay? These are the questions every organization faces when cybercriminals lock their data. By the time attackers have encrypted your systems, the focus shifts from prevention to response. It’s no longer about how it happened, it’s about what you’re willing to do next. Ransomware gangs are becoming more organized and aggressive, and many now operate like businesses. They have customer service, payment portals, and negotiation playbooks. No organization is off-limits. … More →
The post When ransomware strikes, what’s your move? appeared first on Help Net Security.
Canada Warns Cyberdefenders to Buttress Edge Devices
The Canadian Center for Cybersecurity on Tuesday said it has observed "increasing levels" of malicious cyberactivity from China-linked hackers, including the group tracked Salt Typhoon. Exposed edge devices are at risk of attacks can be detected through mass scanning.