Aggregator
CVE-2014-7109 | Nesvarnik 1 X.509 Certificate cryptographic issues (VU#582497)
CVE-2007-4507 | PHP 5.2.3 memory corruption (EDB-4304 / Nessus ID 25971)
Sygnia Managed Detection and Response – Delivering Better Detection
Sygnia MDR provides complete visibility across IT and OT environments to stay Continuously Secure in the face of endlessly evolving threats.
The post Sygnia Managed Detection and Response – Delivering Better Detection appeared first on Sygnia.
Windows 11 KB5043145 update causes reboot loops, blue screens
CVE-2016-1865 | Apple Mac OS X up to 10.11.5 Kernel null pointer dereference (HT206903 / Nessus ID 92496)
CISA Adds Four Known Exploited Vulnerabilities to Catalog
CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2023-25280 D-Link DIR-820 Router OS Command Injection Vulnerability
- CVE-2020-15415 DrayTek Multiple Vigor Routers OS Command Injection Vulnerability
- CVE-2021-4043 Motion Spell GPAC Null Pointer Dereference Vulnerability
- CVE-2019-0344 SAP Commerce Cloud Deserialization of Untrusted Data Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA’s VDP Platform 2023 Annual Report Showcases Success
Today, the Cybersecurity and Infrastructure Security Agency (CISA) released its Vulnerability Disclosure Policy (VDP) Platform 2023 Annual Report, highlighting the service’s remarkable success in 2023, its second full year of operation. Throughout 2023, CISA focused on advocating for the increased agency adoption of the VDP Platform, supporting federal civilian executive branch (FCEB) agencies in identifying vulnerabilities in their systems, and engaging the public security researcher community.
Public security researchers play a vital role in securing our federal government's networks. As part of CISA's persistent and ongoing collaboration with the public security researcher community, CISA issued Binding Operational Directive (BOD) 20-01 in 2020, which requires every FCEB agency to establish a VDP. These VDPs follow industry and community best practices, including giving authorization to participating public security researchers and committing to not pursue legal action for good-faith research.
CISA's VDP Platform complements BOD 20-01 by giving FCEB agencies an easy way to establish a VDP and to engage with public security researchers. CISA appreciates the contributions by thousands of public security researchers to date and looks forward to continuing to further broaden this collaboration in the future.
To learn more about the VDP Platform, please visit the Vulnerability Disclosure Policy (VDP) Platform webpage and view the VDP 101 video on CISA’s YouTube channel.
Shadow AI, Data Exposure Plague Workplace Chatbot Use
Critical Flaws in Tank Gauge Systems Expose Gas Stations to Remote Attacks
CVE-2024-26908 | Linux Kernel up to 6.7.10 xen smp.c kasprintf null pointer dereference (Nessus ID 207689)
CVE-2024-27020 | Linux Kernel up to 5.15.156/6.1.87/6.6.28/6.8.7/6.9-rc4 nf_tables __nft_expr_type_get race condition (Nessus ID 207689)
CVE-2023-52434 | Linux Kernel up to 6.6.7 mount.cifs smb2_parse_contexts null pointer dereference (Nessus ID 207689)
CVE-2024-26826 | Linux Kernel up to 5.15.148/6.1.78/6.6.17/6.7.5 mptcp_sock injection (Nessus ID 207689)
CVE-2022-48686 | Linux Kernel up to 5.4.212/5.10.142/5.15.67/5.19.8 nvme-tcp use after free (Nessus ID 207693)
CVE-2024-36889 | Linux Kernel up to 5.10.217/5.15.158/6.1.90/6.6.30/6.8.9 mptcp net/mptcp/protocol.c snd_nxt initialization (Nessus ID 207693)
CVE-2012-0394 | Apache Struts up to 2.2.3 DebuggingInterceptor acceptedParamNames code injection (EDB-31434 / Nessus ID 207697)
CVE-2012-0394 | Apache Struts up to 2.2.3 DebuggingInterceptor code injection (EDB-18329 / Nessus ID 207697)
CVE-2024-40909 | Linux Kernel up to 6.6.34/6.9.5 bpf_link_free use after free (91cff53136da/fa97b8fed989/2884dc7d08d9 / Nessus ID 207909)
Nigeria Hackers Sentenced for Selling Financial Information on Dark Web
Simon Kaura, a Nigerian national deported from the United Kingdom, was sentenced in a U.S. federal court for his involvement in a global conspiracy to sell stolen financial information on the dark web. The sentencing marks a crucial victory in the fight against cybercrime, shedding light on the sophisticated operations of cybercriminal networks. Five-Year Sentence […]
The post Nigeria Hackers Sentenced for Selling Financial Information on Dark Web appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.