Aggregator
CVE-2023-39454 | Elecom WRC-X1800GS-B/WRC-X1800GSA-B/WRC-X1800GSH-B up to 1.13 buffer overflow
CVE-2024-22372 | Elecom WRC-X1800GS-B 1.09/1.12/1.17/earlier/earlier Request os command injection
CVE-2024-39607 | ELECOM WRC-X6000XS-G/WRC-X1500GS-B/WRC-X1500GSA-B up to 1.11 os command injection
CVE-2011-3493 | Cogentdatahub Cogent DataHub up to 7.1.0 DH_OneSecondTick memory corruption (EDB-17838 / SBV-33259)
SQL注入
Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access
In a sophisticated cyberattack campaign, a threat actor identified as Storm-2372 has been leveraging Microsoft Teams meeting invites to execute “device code phishing” attacks. This campaign, observed since August 2024, targets governments, NGOs, IT services, defense, telecommunications, health, education, and energy sectors across Europe, North America, Africa, and the Middle East. Microsoft’s Threat Intelligence Center […]
The post Hackers Abusing Microsoft Teams Meeting Invites to Trick Victims for Gaining Access appeared first on Cyber Security News.
How CISOs can balance security and business agility in the cloud
In this Help Net Security interview, Natalia Belaya, CISO at Cloudera, discusses common misconceptions about cloud security, the balance between protection and business agility, and overlooked risks that CISOs should prioritize. Belaya also offers practical strategies for integrating cloud-native security solutions and mitigating misconfigurations at scale. What key security principles should enterprises follow when migrating to the cloud, particularly for hybrid and multi-cloud environments? One of the biggest misconceptions about cloud migrations is assuming that … More →
The post How CISOs can balance security and business agility in the cloud appeared first on Help Net Security.