βΌ CVE-2023-32620 βΌ
π Read
via "National Vulnerability Database".
Improper authentication vulnerability in WL-WN531AX2 firmware versions prior to 2023526 allows a network-adjacent attacker to obtain a password for the wireless network.π Read
via "National Vulnerability Database".
π’ Rubrik partners with Microsoft to drive generative AI-powered cyber recovery π’
π Read
via "ITPro".
Rubrik Security Cloud will integrate with Microsoft Sentinel and Azure OpenAI to accelerate recovery from cyber attacks π Read
via "ITPro".
ITPro
Rubrik partners with Microsoft to drive generative AI-powered cyber recovery
Rubrik Security Cloud will integrate with Microsoft Sentinel and Azure OpenAI to accelerate recovery from cyber attacks
π’ NHS data leak raises βserious questionsβ about Manchester University cyber attack π’
π Read
via "ITPro".
NHS patient data used for research purposes is believed to have been compromised in the June attack π Read
via "ITPro".
ITPro
NHS data leak raises βserious questionsβ about Manchester University cyber attack
NHS patient data used for research purposes is believed to have been compromised in the June attack
βΌ CVE-2023-3479 βΌ
π Read
via "National Vulnerability Database".
Cross-site Scripting (XSS) - Reflected in GitHub repository hestiacp/hestiacp prior to 1.7.8.π Read
via "National Vulnerability Database".
π’ TSMC faces $70 million LockBit ransom demand following hardware supplier breach π’
π Read
via "ITPro".
While TSMC has confirmed the breach, it has refuted claims that company operations have been disrupted by the incident π Read
via "ITPro".
ITPro
TSMC faces $70 million LockBit ransom demand following hardware supplier breach
While TSMC has confirmed the breach, it has refuted claims that company operations have been disrupted by the incident
π΄ 3 Ways to Build a More Skilled Cybersecurity Workforce π΄
π Read
via "Dark Reading".
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all. π Read
via "Dark Reading".
Dark Reading
3 Ways to Build a More Skilled Cybersecurity Workforce
With the right collaboration among employers, educators, and policymakers, we can come together to create a more secure environment for all.
βΌ CVE-2023-3478 βΌ
π Read
via "National Vulnerability Database".
A vulnerability classified as critical was found in IBOS OA 4.5.5. Affected by this vulnerability is the function actionEdit of the file ?r=dashboard/roleadmin/edit&op=member of the component Add User Handler. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-232759. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.π Read
via "National Vulnerability Database".
β S3 Ep141: What was Steve Jobsβs first job? β
π Read
via "Naked Security".
Latest episode - listen now! (Full transcript inside.)π Read
via "Naked Security".
Naked Security
S3 Ep141: What was Steve Jobsβs first job?
Latest episode β listen now! (Full transcript inside.)
π Falco 0.35.1 π
π Read
via "Packet Storm Security".
Sysdig Falco is a behavioral activity monitoring agent that is open source and comes with native support for containers. Falco lets you define highly granular rules to check for activities involving file and network activity, process execution, IPC, and much more, using a flexible syntax. Falco will notify you when these rules are violated. You can think about Falco as a mix between snort, ossec and strace.π Read
via "Packet Storm Security".
Packetstormsecurity
Falco 0.35.1 β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
βΌ CVE-2023-37298 βΌ
π Read
via "National Vulnerability Database".
Joplin before 2.11.5 allows XSS via a USE element in an SVG document.π Read
via "National Vulnerability Database".
β€1
βΌ CVE-2023-37299 βΌ
π Read
via "National Vulnerability Database".
Joplin before 2.11.5 allows XSS via an AREA element of an image map.π Read
via "National Vulnerability Database".
βΌ CVE-2023-33276 βΌ
π Read
via "National Vulnerability Database".
The web interface of Gira Giersiepen Gira KNX/IP-Router 3.1.3683.0 and 3.3.8.0 responds with a "404 - Not Found" status code if a path is accessed that does not exist. However, the value of the path is reflected in the response. As the application will reflect the supplied path without context-sensitive HTML encoding, it is vulnerable to reflective cross-site scripting (XSS).π Read
via "National Vulnerability Database".
π’ MITRE publishes the top 25 most dangerous software weaknesses π’
π Read
via "ITPro".
The annual list features the usual suspects and some new entries too π Read
via "ITPro".
ITPro
MITRE publishes the top 25 most dangerous software weaknesses
The annual list features the usual suspects and some new entries too
β€1
π΄ IP Fabric Announces $25M Series B Funding to Accelerate Adoption of Network Assurance π΄
π Read
via "Dark Reading".
One Peak investment will advance the ubiquity of network assurance, helping organizations to reduce network complexity, assure network automation, and improve network security.π Read
via "Dark Reading".
Dark Reading
IP Fabric Announces $25M Series B Funding to Accelerate Adoption of Network Assurance
One Peak investment will advance the ubiquity of network assurance, helping organizations to reduce network complexity, assure network automation, and improve network security.
π΄ Perception Point Unveils AI Model to Thwart Generative AI-Based BEC Attacks π΄
π Read
via "Dark Reading".
The detection model identifies LLM patterns to counter the rising abuse of generative AI in social engineering attacks.π Read
via "Dark Reading".
Dark Reading
Perception Point Unveils AI Model to Thwart Generative AI-Based BEC Attacks
The detection model identifies LLM patterns to counter the rising abuse of generative AI in social engineering attacks.
π΄ Russian Hacktivist Platform 'DDoSia' Grows Exponentially π΄
π Read
via "Dark Reading".
As cybercrime amidst the Russia-Ukraine war continues to escalate, the DDoSia project, launched by a known hacktivist group, has exploded in its number of members and quality of tools used for attacks.π Read
via "Dark Reading".
Dark Reading
Russian Hacktivist Platform 'DDoSia' Grows Exponentially
As cybercrime amidst the Russia-Ukraine war continues to escalate, the DDoSia project, launched by a known hacktivist group, has exploded in its number of members and quality of tools used for attacks.
βΌ CVE-2023-37303 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the CheckUser extension for MediaWiki through 1.39.3. In certain situations, an attempt to block a user fails after a temporary browser hang and a DBQueryDisconnectedError error message.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35178 βΌ
π Read
via "National Vulnerability Database".
Certain HP LaserJet Pro print products are potentially vulnerable to Buffer Overflow when performing a GET request to scan jobs.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37304 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in the DoubleWiki extension for MediaWiki through 1.39.3. includes/DoubleWiki.php allows XSS via the column alignment feature.π Read
via "National Vulnerability Database".
βΌ CVE-2023-35177 βΌ
π Read
via "National Vulnerability Database".
Certain HP LaserJet Pro print products are potentially vulnerable to a stack-based buffer overflow related to the compact font format parser.π Read
via "National Vulnerability Database".
βΌ CVE-2023-37302 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in SiteLinksView.php in Wikibase in MediaWiki through 1.39.3. There is XSS via a crafted badge title attribute. This is also related to lack of escaping in wbTemplate (from resources/wikibase/templates.js) for quotes (which can be in a title attribute).π Read
via "National Vulnerability Database".