Analysis and writeup on weaponizing CVE-2021-21551 without a data-only attack and the importance of Virtualization-Based Security, Hypervisor-Protected Code Integrity, Kernel Control-Flow Guard, and other modern mitigations.
Analysis and writeup on weaponizing CVE-2021-21551 without a data-only attack and the importance of Virtualization-Based Security, Hypervisor-Protected Code Integrity, Kernel Control-Flow Guard, and other modern mitigations.
Analysis and writeup on weaponizing CVE-2021-21551 without a data-only attack and the importance of Virtualization-Based Security, Hypervisor-Protected Code Integrity, Kernel Control-Flow Guard, and other modern mitigations.
Summary
Cisco has published one security advisory. The advisory is rated as Medium and deals with twelve vulnerabilities in the 802.11 standard, which were disclosed in the research paper "Fragment and Forge: Breaking Wi-Fi Through Frame Aggregation and Fragmentation."
Threat Type
Vulnerability
Overview
Cisco has published one security advisory. The advisory is rated as Medium and deals with twelve vulnerabilities in the 802.11 standard, which were disclosed in the research paper "Fragment and Forge: Breaki
Summary
Following the DarkSide ransomware attack on Colonial Pipeline, IBM Security X-Force has released a report providing a summary of the ransomware family, its tactics, techniques, and procedures (TTPs), and attribution.
Threat Type
Ransomware
Overview
IBM Security X-Force has published a report providing an overview of the DarkSide ransomware. The ransomware first appeared in August 2020 and is capable of encrypting Windows and Linux systems. DarkSide uses a "ransomware-as-a-service" (RaaS) model where
Summary
SAP has released its May 2021 security patches for a variety of products. Each product and a link to details on the vulnerability are listed below. In all, 6 security notes were released. Of these, 3 are rated high, 2 are rated as medium, and 1 is rated as low. Additionally, there 5 are updates to previously released patches. The potential impact from successful exploitation of the most serious vulnerability is code injection. In addition, information disclosure, malicious redirection, and other nef