Aggregator
ZDI-CAN-25631: QNAP
ZDI-CAN-25633: QNAP
ZDI-CAN-25596: QNAP
ZDI-CAN-25737: Linux
ZDI-CAN-25641: QNAP
ZDI-CAN-25624: QNAP
ZDI-CAN-25632: QNAP
安全动态回顾|17家单位联合发布《工业和信息化领域数据安全合规指引》 首个针对Linux的UEFI bootkit恶意软件被发现
Windows 在新的网络钓鱼攻击中感染了后门 Linux 虚拟机
CVE-2020-11022 | Oracle Communications Analytics 12.1.1 Platform cross site scripting (EDB-49766 / Nessus ID 209233)
印度电信安全新规引发大量吐槽
牛津年度词是“Brain Rot”
首个针对Linux系统UEFI启动包的攻击“Bootkitty”
CVE-2013-4579 | Linux Kernel 3.0.63 ath9k_htc_set_bssid_mask cryptographic issues (USN-2113-1 / EDB-38826)
CVE-1999-0130 | Berkeley Sendmail 8.7/8.8/8.8.1/8.8.2 Daemon Mode privileges management (EDB-19556 / Nessus ID 11346)
Il Web Tossico, e Sisifo Felice
5 reasons to double down on network security
Cybersecurity programs have evolved significantly over the past few decades. The advent of cloud computing shattered the conventional corporate perimeter, forcing organizations to update their defense strategies. Today, with the rise of work-from-anywhere and bring-your-own-device (BYOD) policies as well as the ongoing shift to cloud environments, we’re seeing a shift of equal magnitude as it is becoming increasingly clear that endpoint security tools alone cannot handle the new threat landscape. Endpoint security is still an … More →
The post 5 reasons to double down on network security appeared first on Help Net Security.
CVE-1999-1028 | Symantec pcAnywhere 8.0 denial of service (EDB-19230 / XFDB-2256)
Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges
In this Help Net Security interview, Alec Summers, Project Leader for the CVE Program at MITRE, shares his insights on the 2024 CWE top 25 most dangerous software weaknesses. He discusses the impact of the new methodology that involves the CNA community and highlights the persistent vulnerabilities that continue to make the list year after year. Summers also touches on the role of AI tools in identifying vulnerabilities and the importance of root cause mapping … More →
The post Inside the 2024 CWE Top 25: Trends, surprises, and persistent challenges appeared first on Help Net Security.