Aggregator
VPN в один клик: Windows Defender на страже общественного Wi-Fi
9 months 2 weeks ago
Microsoft расширяет опции Защитника на все платформы.
Image Splitter-免费在线图片分割工具
9 months 2 weeks ago
Image Splitter是什么
Image Splitter是一款免费在线图片分割工具,适合社交媒体和网页设计等用途。用户可以上传图片,选择分割方式,几秒钟内即可获得高分辨率输出。支持JPG...
黑海洋
Сбой в банке Англии: 91 минута, потрясшая финансовый мир
9 months 2 weeks ago
Что привело к заморозке транзакций на миллионы фунтов стерлингов?
Cookie-share:Cookie分享管理工具 免登录实现帐号共享
9 months 2 weeks ago
Cookie-share是什么
Cookie-share是一款基于Chrome/Edge 扩展的Cookie分享管理工具,免登录实现帐号共享,允许用户在不同设备或浏览器之间发送和接收 cooki...
黑海洋
Когда торт улыбается: почему мы видим лица, там, где их нет, и может ли ИИ так же?
9 months 2 weeks ago
Исследователи из MIT раскрывают тайны парейдолии.
快速创建并运行优化的虚拟机Windows、macOS 和 Linux
9 months 2 weeks ago
简介:Quickemu 是优秀的 QEMU 的包装器,在创建虚拟机时会自动 “做正确的事”。无需详尽的配置选项。你决定要运行什么操作系统,而 Quickemu 会处理其余...
黑海洋
Техасский кошмар: как одна кибератака может стоить сотен жизней
9 months 2 weeks ago
Вымогатели нарушили работу крупнейшего медицинского центра региона.
OWG Parallax Private Cloud Desktop simplifies business operations
9 months 2 weeks ago
OWG unveiled Parallax Private Cloud Desktop to provide businesses with IT solutions that ensure efficiency, security, and scalability. This next-generation cloud platform is engineered to meet the most stringent security protocols, empowering businesses to meet evolving IT challenges head-on. Brandon Marks, Managing Partner at OWG, emphasized the innovative approach taken in developing the Parallax Private Cloud Desktop: “We listened to business leaders who were craving more flexibility and control over their tech;they don’t want to … More →
The post OWG Parallax Private Cloud Desktop simplifies business operations appeared first on Help Net Security.
Industry News
ISACA: European Security Teams Are Understaffed and Underfunded
9 months 2 weeks ago
New ISACA research reveals most cybersecurity teams are suffering from staffing and funding shortages
Hosts tab in NetworkMiner Professional
9 months 2 weeks ago
The PCAP file analyzed in this video is MD_2015-07-22_112601.pcap, which is a snippet of the training data used in our network forensics classes from 2015 to 2019. Techniques, tools and databases mentioned in the tutorial: CIDR notationSatorip0fmac-ages Check out our Passive OS Fingerprinting blog p[...]
Erik Hjelmvik
Киберудар по воздуху: Израиль vs. Иран
9 months 2 weeks ago
Один самолет стал причиной возможной эскалации конфликта между странами.
Fuzzer 开发1:一个新机器
9 months 2 weeks ago
看雪论坛作者ID:pureGavin【译】
SDC2024议题聚焦 | 智能摩托车进化之路
9 months 2 weeks ago
你的摩托车安全吗?
CVE-2023-46144 | Phoenix Contact AXC F 1152 code download (VDE-2023-056)
9 months 2 weeks ago
A vulnerability classified as problematic has been found in Phoenix Contact AXC F 1152, AXC F 2152, AXC F 3152, BPC 9102S, EPC 1502, EPC 1522, PLCnext Engineer, RFC 4072R and RFC 4072S. Affected is an unknown function. The manipulation leads to download of code without integrity check.
This vulnerability is traded as CVE-2023-46144. It is possible to launch the attack remotely. There is no exploit available.
vuldb.com
CVE-2024-41176 | Beckhoff MDP Package/TwinCAT BSD HTTP buffer overflow (VDE-2024-050)
9 months 2 weeks ago
A vulnerability was found in Beckhoff MDP Package and TwinCAT BSD. It has been classified as critical. Affected is an unknown function of the component HTTP Handler. The manipulation leads to buffer overflow.
This vulnerability is traded as CVE-2024-41176. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-6876 | OSCAT/CODESYS Basic Library up to 3.3.4 out-of-bounds
9 months 2 weeks ago
A vulnerability was found in OSCAT/CODESYS Basic Library up to 3.3.4. It has been rated as problematic. Affected by this issue is some unknown functionality. The manipulation leads to out-of-bounds read.
This vulnerability is handled as CVE-2024-6876. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-43389 | Phoenix Contact FL MGUARD 2102 Environment Variable injection (VDE-2024-039)
9 months 2 weeks ago
A vulnerability was found in Phoenix Contact FL MGUARD 2102, FL MGUARD 2105, FL MGUARD 4102 PCI, FL MGUARD 4102 PCIE, FL MGUARD 4302, FL MGUARD 4305, FL MGUARD CENTERPORT VPN-1000, FL MGUARD CORE TX, FL MGUARD CORE TX VPN, FL MGUARD DELTA TX, TX, TX VPN, FL MGUARD GT, GT, GT VPN, FL MGUARD PCI4000, FL MGUARD PCI4000 VPN, FL MGUARD PCIE4000, FL MGUARD PCIE4000 VPN, FL MGUARD RS2000 TX, TX-B, FL MGUARD RS2005 TX VPN, FL MGUARD RS4000 TX, TX-M, TX-P, FL MGUARD RS4004 TX, DTX, DTX VPN, FL MGUARD SMART2, FL MGUARD SMART2 VPN, TC MGUARD RS2000 3G VPN, TC MGUARD RS2000 4G ATT VPN, TC MGUARD RS2000 4G VPN, TC MGUARD RS2000 4G VZW VPN, TC MGUARD RS4000 3G VPN, TC MGUARD RS4000 4G ATT VPN, TC MGUARD RS4000 4G VPN and TC MGUARD RS4000 4G VZW VPN. It has been classified as critical. Affected is an unknown function of the component Environment Variable Handler. The manipulation of the argument OSPF_INTERFACE.SIMPLE_KEY/OSPF_INTERFACE.DIGEST_KEY leads to injection.
This vulnerability is traded as CVE-2024-43389. It is possible to launch the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-43390 | Phoenix Contact FL MGUARD 2102 Environment Variable FW_NAT.IN_IP injection (VDE-2024-039)
9 months 2 weeks ago
A vulnerability classified as critical has been found in Phoenix Contact FL MGUARD 2102, FL MGUARD 2105, FL MGUARD 4102 PCI, FL MGUARD 4102 PCIE, FL MGUARD 4302, FL MGUARD 4305, FL MGUARD CENTERPORT VPN-1000, FL MGUARD CORE TX, FL MGUARD CORE TX VPN, FL MGUARD DELTA TX, TX, TX VPN, FL MGUARD GT, GT, GT VPN, FL MGUARD PCI4000, FL MGUARD PCI4000 VPN, FL MGUARD PCIE4000, FL MGUARD PCIE4000 VPN, FL MGUARD RS2000 TX, TX-B, FL MGUARD RS2005 TX VPN, FL MGUARD RS4000 TX, TX-M, TX-P, FL MGUARD RS4004 TX, DTX, DTX VPN, FL MGUARD SMART2, FL MGUARD SMART2 VPN, TC MGUARD RS2000 3G VPN, TC MGUARD RS2000 4G ATT VPN, TC MGUARD RS2000 4G VPN, TC MGUARD RS2000 4G VZW VPN, TC MGUARD RS4000 3G VPN, TC MGUARD RS4000 4G ATT VPN, TC MGUARD RS4000 4G VPN and TC MGUARD RS4000 4G VZW VPN. This affects an unknown part of the component Environment Variable Handler. The manipulation of the argument FW_NAT.IN_IP leads to injection.
This vulnerability is uniquely identified as CVE-2024-43390. It is possible to initiate the attack remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-43391 | Phoenix Contact FL MGUARD 2102 Environment Variable FW_PORTFORWARDING.SRC_IP injection (VDE-2024-039)
9 months 2 weeks ago
A vulnerability classified as critical was found in Phoenix Contact FL MGUARD 2102, FL MGUARD 2105, FL MGUARD 4102 PCI, FL MGUARD 4102 PCIE, FL MGUARD 4302, FL MGUARD 4305, FL MGUARD CENTERPORT VPN-1000, FL MGUARD CORE TX, FL MGUARD CORE TX VPN, FL MGUARD DELTA TX, TX, TX VPN, FL MGUARD GT, GT, GT VPN, FL MGUARD PCI4000, FL MGUARD PCI4000 VPN, FL MGUARD PCIE4000, FL MGUARD PCIE4000 VPN, FL MGUARD RS2000 TX, TX-B, FL MGUARD RS2005 TX VPN, FL MGUARD RS4000 TX, TX-M, TX-P, FL MGUARD RS4004 TX, DTX, DTX VPN, FL MGUARD SMART2, FL MGUARD SMART2 VPN, TC MGUARD RS2000 3G VPN, TC MGUARD RS2000 4G ATT VPN, TC MGUARD RS2000 4G VPN, TC MGUARD RS2000 4G VZW VPN, TC MGUARD RS4000 3G VPN, TC MGUARD RS4000 4G ATT VPN, TC MGUARD RS4000 4G VPN and TC MGUARD RS4000 4G VZW VPN. This vulnerability affects unknown code of the component Environment Variable Handler. The manipulation of the argument FW_PORTFORWARDING.SRC_IP leads to injection.
This vulnerability was named CVE-2024-43391. The attack can be initiated remotely. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com