Aggregator
CVE-2022-48950 | Linux Kernel up to 5.15.83/6.0.13 perf_pending_task use after free (8bffa95ac19f/78e1317a174e/517e6a301f34)
CVE-2022-48951 | Linux Kernel up to 6.0.13 snd_soc_put_volsw_sx out-of-bounds
Unmanaged Cloud Credentials Pose Risk to Half of Orgs
Cisco Disables DevHub Access After Security Breach
CVE-2022-48956 | Linux Kernel up to 6.0.12 include/net/ip6_fib.h ip6_fragment use after free
CVE-2024-50026 | Linux Kernel up to 6.1.112/6.6.56/6.11.3 wd33c93_intr scsi_pointer initialization
CVE-2022-49033 | Linux Kernel up to 6.0.11 include/linux/sched/mm.h btrfs_qgroup_inherit stack-based overflow
CVE-2022-49026 | Linux Kernel up to 5.10.157/5.15.81/6.0.11 e100_xmit_prepare use after free
CVE-2022-49024 | Linux Kernel up to 5.15.81/6.0.11 m_can_class_free_dev allocation of resources (ea8dc27bb044/0bbb88651ef6/1eca1d4cc21b)
CVE-2022-49018 | Linux Kernel up to 6.0.11 mptcp net/mptcp/protocol.c in_atomic stack-based overflow (d8e6c5500dbf/b4f166651d03)
CVE-2022-49016 | Linux Kernel up to 5.15.81/6.0.11 mdiobus of_node_get/of_node_put reference count (543d917f691a/2708b3574404/cdde1560118f)
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that
ransomware is a growing existential threat to our country, at the hands of our
adversaries.
A top US national cybersecurity advisor stated
in a recent op-ed, “This is a troubling practice that must end.” The government is looking at ways to disrupt
ransomware attacks. One tactic is to get
cyber insurance companies to stop reimbursements for ransoms.
Undermining ransomware is possible, but the only path is to
outlaw digital extortion payments. This
targets the root of the problem by undermining the motivation of the attacker.
For decades, cybersecurity and insurance companies have taken
advantage of growing attacks and fears to sell their products, which have not provided
a meaningful solution to stop the widespread surge of ransomware. It has become a self-serving profit center to
motivate customers to purchase more tools and policies for a problem they are
not solving.
Security controls are a costly tactic where the attacker
maintains a significant overall advantage because they can quickly adapt, thereby
requiring more tools to be purchased by the potential victims who are caught in
an endless spending cycle. Insurance
does nothing to reduce attacks, as it is a mechanism to transfer risk. In fact, paying the attacker simply motivates
them more, thereby precipitating even more attacks!
There are feasible and practical plans
that would work. However, security and
insurance companies are the first to cast doubt on any plans that may disrupt
their revenue streams. Their narratives
are foreboding, but when closely examined, the fears of outlawing payments are largely unfounded.
As a nation, we are beginning to see how digital extortion is
effectively being used by international adversaries and cybercriminals. The trend will continue, rapidly causing more
extensive harm. Traditional measures,
like continually adding more security tools, continue to fail in fundamental
ways, and we must take a different approach.
It is time for the US government to take a serious step
forward to undermine ransomware, without creating an unnecessary financial
burden on the potential victims, by outlawing digital extortion payments.
The post Are Leaders Ready to Break the Ransomware Cycle appeared first on Security Boulevard.
CVE-2022-49013 | Linux Kernel up to 5.4.225/5.10.157/5.15.81/6.0.11 sctp_stream_outq_migrate memory leak
CVE-2022-49004 | Linux Kernel up to 5.15.81/6.0.11 denial of service (fa7a7d185ef3/96f479383d92/3f105a742725)
CVE-2022-49001 | Linux Kernel up to 5.15.81/6.0.11 get_overflow_stack stack-based overflow (ac00301adb19/879fabc5a954/7e1864332fbc)
Live Webinar | SOC Monitoring: Around-the-Clock Threat Protection for Government Agencies
New York Detective Indicted for Darknet Card Data Buys
An FBI probe into shuttered cybercrime site Genesis Market has led to the indictment of Terrance Ciszek, a now-suspended police detective in Buffalo, New York, who's been accused of buying stolen payment card data and recording a video showing fraudsters how to use it anonymously.
Sophos Fortifies XDR Muscle With $859M Secureworks Purchase
Sophos is acquiring Secureworks in a deal valued at $859 million, aiming to integrate its managed security services with Secureworks' Taegis XDR platform. This merger is expected to deliver advanced detection and response capabilities, and enhance global cybersecurity for businesses of all sizes.
Insiders Confuse Microsoft 365 Copilot Responses
Researchers found an easy way to manipulate the responses of an artificial intelligence system that makes up the backend of tools such as Microsoft 365 Copilot, potentially compromising confidential information and exacerbating misinformation. Researchers called the attack "ConfusedPilot."