Aggregator
CVE-2022-48962 | Linux Kernel up to 6.0.12 hisi_femac_rx use after free
CVE-2022-48961 | Linux Kernel up to 5.15.82/6.0.12 of_node_get/of_node_put reference count (16854177745a/a5c6de1a6656/cb37617687f2)
CVE-2022-48960 | Linux Kernel up to 6.0.12 hix5hd2_rx use after free
CVE-2022-48959 | Linux Kernel up to 5.10.158/5.15.82/6.0.12 sja1105_setup_devlink_regions memory leak
CVE-2022-48958 | Linux Kernel up to 6.0.12 aeroflex greth_init_rings allocation of resources
CVE-2022-48957 | Linux Kernel up to 5.15.82/6.0.12 dpaa2_switch_acl_entry_add memory leak (54d830e24247/785ee7a82297/4fad22a1281c)
CVE-2022-48955 | Linux Kernel up to 5.15.82/6.0.12 tbnet_open memory leak (b9274dbe3999/ed6e955f3b7e/ed14e5903638)
CVE-2022-48950 | Linux Kernel up to 5.15.83/6.0.13 perf_pending_task use after free (8bffa95ac19f/78e1317a174e/517e6a301f34)
CVE-2022-48951 | Linux Kernel up to 6.0.13 snd_soc_put_volsw_sx out-of-bounds
Unmanaged Cloud Credentials Pose Risk to Half of Orgs
Cisco Disables DevHub Access After Security Breach
CVE-2022-48956 | Linux Kernel up to 6.0.12 include/net/ip6_fib.h ip6_fragment use after free
CVE-2024-50026 | Linux Kernel up to 6.1.112/6.6.56/6.11.3 wd33c93_intr scsi_pointer initialization
CVE-2022-49033 | Linux Kernel up to 6.0.11 include/linux/sched/mm.h btrfs_qgroup_inherit stack-based overflow
CVE-2022-49026 | Linux Kernel up to 5.10.157/5.15.81/6.0.11 e100_xmit_prepare use after free
CVE-2022-49024 | Linux Kernel up to 5.15.81/6.0.11 m_can_class_free_dev allocation of resources (ea8dc27bb044/0bbb88651ef6/1eca1d4cc21b)
CVE-2022-49018 | Linux Kernel up to 6.0.11 mptcp net/mptcp/protocol.c in_atomic stack-based overflow (d8e6c5500dbf/b4f166651d03)
CVE-2022-49016 | Linux Kernel up to 5.15.81/6.0.11 mdiobus of_node_get/of_node_put reference count (543d917f691a/2708b3574404/cdde1560118f)
Are Leaders Ready to Break the Ransomware Cycle
It is good to see US government leaders realize that
ransomware is a growing existential threat to our country, at the hands of our
adversaries.
A top US national cybersecurity advisor stated
in a recent op-ed, “This is a troubling practice that must end.” The government is looking at ways to disrupt
ransomware attacks. One tactic is to get
cyber insurance companies to stop reimbursements for ransoms.
Undermining ransomware is possible, but the only path is to
outlaw digital extortion payments. This
targets the root of the problem by undermining the motivation of the attacker.
For decades, cybersecurity and insurance companies have taken
advantage of growing attacks and fears to sell their products, which have not provided
a meaningful solution to stop the widespread surge of ransomware. It has become a self-serving profit center to
motivate customers to purchase more tools and policies for a problem they are
not solving.
Security controls are a costly tactic where the attacker
maintains a significant overall advantage because they can quickly adapt, thereby
requiring more tools to be purchased by the potential victims who are caught in
an endless spending cycle. Insurance
does nothing to reduce attacks, as it is a mechanism to transfer risk. In fact, paying the attacker simply motivates
them more, thereby precipitating even more attacks!
There are feasible and practical plans
that would work. However, security and
insurance companies are the first to cast doubt on any plans that may disrupt
their revenue streams. Their narratives
are foreboding, but when closely examined, the fears of outlawing payments are largely unfounded.
As a nation, we are beginning to see how digital extortion is
effectively being used by international adversaries and cybercriminals. The trend will continue, rapidly causing more
extensive harm. Traditional measures,
like continually adding more security tools, continue to fail in fundamental
ways, and we must take a different approach.
It is time for the US government to take a serious step
forward to undermine ransomware, without creating an unnecessary financial
burden on the potential victims, by outlawing digital extortion payments.
The post Are Leaders Ready to Break the Ransomware Cycle appeared first on Security Boulevard.