Aggregator
CVE-2008-3819 | Cisco Gss 4492r Global Site Selector up to 3.0 denial of service (Nessus ID 68961 / ID 43160)
CVE-2008-3825 | Red Hat Enterprise Linux up to 5 access control (Nessus ID 67753 / ID 117231)
CVE-2011-0995 | Rubyforge rubygem-sqlite3 1.2.0/1.2.1/1.2.2/1.2.3 access control (Bug 685928 / ID 165190)
CVE-2010-4661 | udisks up to 1.0.2 Kernel Module Loader unrestricted upload (Nessus ID 76038 / ID 165190)
CVE-2008-3838 | Sun OpenSolaris up to Snv 84 Remote Procedure Call input validation (Nessus ID 34067 / ID 115923)
CVE-2008-3858 | IBM DB2 Universal Database up to 9.0 access control (ID 19515 / XFDB-45138)
CVE-2008-3839 | Sun OpenSolaris up to Snv 87 NFS Server denial of service (Nessus ID 34066 / ID 115929)
CVE-2008-3862 | Trend Micro OfficeScan 7.3/8.0 CGI Program memory corruption (Nessus ID 34490 / ID 116001)
CVE-2008-3862 | Trend Micro OfficeScan CGI Parser memory corruption (Nessus ID 34490 / ID 116001)
CVE-2008-3870 | Sun Solaris 8.0/9.0 numeric error (Nessus ID 13405 / ID 116436)
Cyber threats are changing and here’s what you should watch for
In this Help Net Security video, Stefan Tanase, Cyber Intelligence Expert at CSIS, gives an overview of how cybercriminals are changing their tactics, including using legitimate tools to avoid detection and developing more advanced info-stealing malware. Tanase also talks about new social engineering tricks like fake CAPTCHAs, changes in ransomware patterns, and the rise of mobile phishing attacks.
The post Cyber threats are changing and here’s what you should watch for appeared first on Help Net Security.
清华大学 | 基于HTTP/2服务器推送和签名HTTP交换的跨源Web攻击
CVE-2012-5223 | Crawlability vbseo up to 3.6.0 preg_replace char_repl code injection (EDB-18424 / XFDB-72689)
CVE-2010-3900 | Christian Dywan Midori up to 0.2.4 Certificates authentication spoofing (Nessus ID 53764 / ID 165174)
CVE-2010-4523 | opensc up to 0.11.13 card-acos5.c memory corruption (ID 4913 / Nessus ID 72073)
CVE-2008-3877 | Acoustica Mixcraft 3.0/4.1/4.2 memory corruption (EDB-6322 / ID 118017)
CVE-2008-3879 | Ultrashareware Ultra Office Control up to 2.0.2008.801 ActiveX Control OfficeCtrl.ocx first input validation (EDB-6319 / ID 115945)
CVE-2010-2264 | Apple Safari up to 4.0.5 information disclosure (USN-1006-1 / Nessus ID 47751)
AI forces security leaders to rethink hybrid cloud strategies
Hybrid cloud infrastructure is under mounting strain from the growing influence of AI, according to Gigamon. Cyberthreats grow in scale and sophistication As cyberthreats increase in both scale and sophistication, breach rates have surged to 55% during the past year, representing a 17% year-on-year rise, with AI-generated attacks emerging as a key driver of this growth. Security and IT teams are being pushed to a breaking point, with the economic cost of cybercrime now estimated … More →
The post AI forces security leaders to rethink hybrid cloud strategies appeared first on Help Net Security.