Aggregator
地缘政治冲击开源世界,Linux内核项目移除11名俄罗斯贡献者;Wi-Fi联盟测试工具或藏重大安全隐患,多款路由器面临风险|牛览
问卷调研 | 2024我国信创安全落地应用情况
Fraudsters revive old tactics mixed with modern technology
Threat actors continue to probe the payments ecosystem for vulnerabilities and were successful in conducting fraud schemes affecting multiple financial institutions, technologies, and processes, according to Visa. The resurgence of physical theft Scammers are going back to basics with an increase of physical theft over the past six months, capitalizing on the window between the theft and the victim’s awareness. After a theft, the most common ways the criminals are capitalizing on their theft by … More →
The post Fraudsters revive old tactics mixed with modern technology appeared first on Help Net Security.
CVE-2024-36954 | Linux Kernel up to 6.8.9 tipc __skb_linearize memory leak (Nessus ID 209785)
CVE-2022-48823 | Linux Kernel up to 5.4.179/5.10.100/5.15.23/5.16.9 qedf reference count (Nessus ID 209785)
CVE-2021-47617 | Linux Kernel up to 5.16.5 IRQ pciehp_isr infinite loop (Nessus ID 209785)
CVE-2022-48742 | Linux Kernel up to 5.16.5 rtnetlink __rtnl_newlink use after free (Nessus ID 209785)
CVE-2022-48809 | Linux Kernel up to 5.16.9 net tun_dst_unclone memory leak (Nessus ID 209785)
CVE-2024-35893 | Linux Kernel up to 6.8.4 lib/iov_iter.c tcf_skbmod_dump stack-based overflow (Nessus ID 209785)
CVE-2024-36007 | Linux Kernel up to 6.8.8 spectrum_acl_tcam core_acl_flex_keys.c information disclosure (Nessus ID 209785)
CVE-2023-52730 | Linux Kernel up to 6.1.12 sdio_add_func memory leak (Nessus ID 209785)
CVE-2022-48839 | Linux Kernel up to 5.16.16 packet_recvmsg out-of-bounds (Nessus ID 209785)
CVE-2024-35853 | Linux Kernel up to 6.8.8 spectrum_acl_tcam lib/parman.c memory leak (Nessus ID 209785)
CVE-2024-35855 | Linux Kernel up to 6.8.8 spectrum_acl_tcam use after free (Nessus ID 209785)
CVE-2023-52754 | Linux Kernel up to 5.10.201/5.15.139/6.1.63/6.5.12/6.6.2 media imon_context memory corruption (Nessus ID 209785)
JVN: iniNet Solutions製SpiderControl SCADA PC HMI Editorにおけるパストラバーサルの脆弱性
CVE-2017-2407 | Apple macOS up to 10.12.3 FontParser memory corruption (HT207615 / EDB-40961)
Adversarial groups adapt to exploit systems in new ways
In this Help Net Security video, Jake King, Head of Threat & Security Intelligence at Elastic, discusses the key findings from the 2024 Elastic Global Threat Report. Adversaries are utilizing off-the-shelf tools Offensive security tools (OSTs), including Cobalt Strike and Metasploit, made up ~54% of observed malware alerts Cobalt Strike accounted for 27% of malware attacks Enterprises are misconfiguring cloud environments, allowing adversaries to thrive Nearly 47% of Microsoft Azure failures were tied to storage … More →
The post Adversarial groups adapt to exploit systems in new ways appeared first on Help Net Security.