Aggregator
CVE-2023-25922 | IBM Security Guardium Key Lifecycle Manager 3.0/3.0.1/4.0/4.1/4.1.1 unrestricted upload (XFDB-247621)
Test Your Cyber Skills With the SANS Holiday Hack Challenge
CVE-2003-0339 | WsMp3 Daemon 0.0.8/0.0.9/0.0.10 HTTP Request memory corruption (EDB-33 / XFDB-12041)
A Threat Actor Claims to be Selling Email Access to PrestaShop
A Threat Actor Allegedly Leaked the Data of HGS
A Threat Actor Claims to be Selling RDWeb Access to an Unidentified Canadian Company
German agency BSI sinkholed a botnet of 30,000 devices infected with BadBox
Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption
The recent massive telecom hack by the Chinese state-sponsored group Salt Typhoon has highlighted critical vulnerabilities in traditional communication systems. The breach targeted major U.S. telecom providers, including Verizon, AT&T, and T-Mobile, compromising sensitive communications of government officials, political entities, and businesses. Attackers accessed call records, unencrypted text messages, and even live call audio by […]
The post Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption appeared first on PreVeil.
The post Why the Recent Telecom Hack Underscores the Need for End-to-End Encryption appeared first on Security Boulevard.
FIGHTER BLACKHAT CYBER CRIME Targeted the Website of Elbit Systems
CVE-2024-50202 | Linux Kernel up to 5.10.227/5.15.168/6.1.113/6.6.57/6.11.4 nilfs_find_entry exceptional condition (Nessus ID 212993)
CVE-2024-47712 | Linux Kernel up to 6.11.1 wilc1000 wilc_parse_join_bss_param use after free (Nessus ID 212998)
CVE-2024-47718 | Linux Kernel up to 6.11.1 rtw88 rtw_wait_firmware_completion use after free (Nessus ID 212995)
CVE-2023-27372 | SPIP up to 3.2.17/4.0.9/4.1.7/4.2.0 Form Value deserialization (EDB-51536)
CVE-2024-50160 | Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5 cs8409 snd_hda_gen_add_kctl null pointer dereference (Nessus ID 213001)
CVE-2024-50201 | Linux Kernel up to 5.10.227/5.15.168/6.1.113/6.6.57/6.11.4 radeon initialization (Nessus ID 212999)
CVE-2024-50205 | Linux Kernel up to 5.15.169/6.1.114/6.6.58/6.11.5 ALSA apply_constraint_to_size divide by zero (Nessus ID 213002)
CVE-2024-2881 | wolfSSL up to 5.6.6 on Linux wolfCrypt ed25519.c in wc_ed25519_sign_msg Rowhammer improper restriction of software interfaces to hardware features (Nessus ID 213003)
Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors
An unknown hacker called MUT-1244 used information-stealing malware to not only grab sensitive data from cybersecurity professionals but also to steal WordPress credentials from other bad actors who had bought them on the dark web.
The post Hacker Uses Info-Stealer Against Security Pros, Other Bad Actors appeared first on Security Boulevard.