Aggregator
CVE-2020-6207 | SAP Solution Manager 7.2 privileges management (ID 161993)
CVE-2020-5902 | F5 BIG-IP Traffic Management User Interface code injection (K52145254 / EDB-48711)
CVE-2020-6287 | SAP NetWeaver AS JAVA 7.3/7.4/7.5 LM Configuration Wizard RECON improper authentication
CVE-2020-3992 | VMware ESXi up to 6.5/6.7/7.0 OpenSLP use after free
CVE-2020-27950 | Apple iOS/iPadOS up to 14.1 Kernel information disclosure (HT211929)
CVE-2020-27932 | Apple iOS/iPadOS up to 14.1 Kernel type confusion (HT211929)
CVE-2020-27932 | Apple macOS up to 10.15.7 Kernel type confusion (HT211947)
CVE-2020-27950 | Apple macOS up to 10.15.7 Kernel initialization (HT211947)
CVE-2020-27932 | Apple watchOS up to 5.3.8/6.2.8/7.0.3 Kernel type confusion (HT211928)
CVE-2020-9934 | Apple iOS/iPadOS up to 13.5.1 CoreFoundation information disclosure (HT211288)
CVE-2020-9934 | Apple macOS up to 10.15.5 CoreFoundation information disclosure (HT211289)
CVE-2020-9907 | Apple tvOS up to 13.4.7 AVEVideoEncoder memory corruption (HT211290)
Alibaba’s Qwen 2.5-Max: The AI Marathoner Outpacing DeepSeek and Catching OpenAI’s Shadow
Discover how Alibaba's Qwen 2.5-Max AI model with Mixture-of-Experts architecture outperforms DeepSeek V3 in key benchmarks, challenges OpenAI, and revolutionizes healthcare, finance, and content creation. Explore technical breakthroughs and industry implications.
The post Alibaba’s Qwen 2.5-Max: The AI Marathoner Outpacing DeepSeek and Catching OpenAI’s Shadow appeared first on Security Boulevard.
Researchers Uncover Lazarus Group Admin Layer for C2 Servers
ClatsCracker: A Versatile Python Password-Cracking Tool Supporting Over 15 Hash Algorithms
U.S. CISA adds Apple products’ flaw to its Known Exploited Vulnerabilities catalog
RansomHub
A Comprehensive Guide to Healthcare Cybersecurity
The healthcare industry faces a unique and urgent challenge in the ever-evolving world of cyber threats. As businesses across sectors fortify their digital defenses, healthcare stands out as a critical target due to its reliance on interconnected devices and vast repositories of sensitive patient data. Safeguarding healthcare’s digital infrastructure, including electronic health records, networked medical … Continued
DEF CON 32 – Tough Adversary Don’t Blame Sun Tzu
Author/Presenter: Gregory Carpenter, DrPH
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Tough Adversary Don’t Blame Sun Tzu appeared first on Security Boulevard.