Aggregator
CVE-2024-43093 | Google Android 12/13/14/15 ExternalStorageProvider.java shouldHideDocument Local Privilege Escalation
GOG 宣布了经典游戏的保存计划
Typecho 搜索功能空格过滤问题解决办法
LedgerHQ 软件供应链安全事件
5 BCDR Oversights That Leave You Exposed to Ransomware
Принципы против правил: этический конфликт Trust Security и Immunefi в bug bounty
FBI confirms China-linked cyber espionage involving breached telecom providers
After months of news reports that Chinese threat actors have breached the networks of US telecommunications and internet service providers, the FBI and the Cybersecurity and Infrastructure Security Agency (CISA) have confirmed the success of the attacks, which were part of a “broad and significant cyber espionage campaign.” “Specifically, we have identified that PRC-affiliated actors have compromised networks at multiple telecommunications companies to enable the theft of customer call records data, the compromise of private … More →
The post FBI confirms China-linked cyber espionage involving breached telecom providers appeared first on Help Net Security.
观点 | 为提升数据安全治理监管能力筑牢法治根基
关注 | 国家计算机病毒应急处理中心监测发现13款违规移动应用
关注 | 公安部公布10起网上侵权假冒犯罪典型案例
公安部:依法查处利用网络传授制枪制爆犯罪方法等违法犯罪
前沿 | ChatGPT检索功能可能引发的法律风险及防控
专家解读 | 打造国家数据标准体系,形成国家数据基础设施框架
招聘启事 | 中国信息安全测评中心招聘安全测评人员
恶意 PyPI 包窃取了 AWS 密钥
CISA Releases Nineteen Industrial Control Systems Advisories
CISA released nineteen Industrial Control Systems (ICS) advisories on November 14, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-319-01 Siemens RUGGEDCOM CROSSBOW
- ICSA-24-319-02 Siemens SIPORT
- ICSA-24-319-03 Siemens OZW672 and OZW772 Web Server
- ICSA-24-319-04 Siemens SINEC NMS
- ICSA-24-319-05 Siemens Solid Edge
- ICSA-24-319-06 Siemens SCALANCE M-800 Family
- ICSA-24-319-07 Siemens Engineering Platforms
- ICSA-24-319-08 Siemens SINEC INS
- ICSA-24-319-09 Siemens Spectrum Power 7
- ICSA-24-319-10 Siemens TeleControl Server
- ICSA-24-319-11 Siemens SIMATIC CP
- ICSA-24-319-12 Siemens Mendix Runtime
- ICSA-24-319-13 Rockwell Automation Verve Asset Manager
- ICSA-24-319-14 Rockwell Automation FactoryTalk Updater
- ICSA-24-319-15 Rockwell Automation Arena Input Analyzer
- ICSA-24-319-16 Hitachi Energy MSM
- ICSA-24-319-17 2N Access Commander
- ICSA-24-291-01 Elvaco M-Bus Metering Gateway CMe3100 (Update A)
- ICSMA-24-319-01 Baxter Life2000 Ventilation System
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Two Known Exploited Vulnerabilities to Catalog
CISA has added two new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability
- CVE-2024-9465 Palo Alto Networks Expedition SQL Injection Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.