Aggregator
Chinese Hackers Exploit Visual Studio Code in Southeast Asian Cyberattacks
От Москвы до Урала: карта кибервойны в России
Сплетни: лекарство или яд для человеческих отношений?
Qilin
Qilin
安全动态回顾|网络安全知识手册正式发布 谷歌将Pixel EoP漏洞修复程序反向移植到其他Android设备
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2016-3714 ImageMagick Improper Input Validation Vulnerability
- CVE-2017-1000253 Linux Kernel PIE Stack Buffer Corruption Vulnerability
- CVE-2024-40766 SonicWall SonicOS Improper Access Control Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Now Live: Living Cells Can Be Seen With Infrared Light
美军特战部队首次展示WiFi“网络爆破”新技能
白帽黑客行为应受保护!这个国家总理宣布将修改法律
Кто решает, кому быть онлайн? Илон Маск и его интернет-империя
Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711)
CVE-2024-40711, a critical vulnerability affecting Veeam Backup & Replication (VBR), could soon be exploited by attackers to steal enterprise data. Discovered and reported by Code WHite researcher Florian Hauser, the vulnerability can be leveraged for full system takeover, and security researchers from watchTowr Labs have already confirmed its potential for exploitation. Luckily for enterprises using VBR, both companies have refrained from sharing PoC exploit code or additional details about the flaw until most admins have … More →
The post Veeam Backup & Replication RCE flaw may soon be leveraged by ransomware gangs (CVE-2024-40711) appeared first on Help Net Security.