Aggregator
CVE-2008-2963 | MyBlog index.php id sql injection (EDB-5913 / XFDB-43292)
CVE-2008-2983 | Cwh Underground Demo4 CMS 01 index.php id sql injection (EDB-5914 / XFDB-43291)
CVE-2008-2990 | FacileForms 1.4.4 on Mambo/Joomla facileforms.frame.php ff_compath code injection (EDB-5915 / XFDB-43290)
CVE-2008-6193 | MyBlog MySQL Database cryptographic issues (EDB-5913 / XFDB-48843)
Fortinet 发现零日攻击中使用了新的严重 FortiManager 漏洞
Agentic AI: A New Way to Accelerate Your Security Operations
Agentic AI: A New Way to Accelerate Your Security Operations
Akamai strenghtens protection against account abuse
Akamai launched new capabilities to its Account Protector security solution. These enhancements are designed to safeguard user accounts against abuse throughout their entire lifecycle and provide advanced protection against account opening abuse, account takeover attacks, and other attack schemes. The new capabilities enable organizations to protect accounts from the moment they are created, through password resets, logins, and all post-login activities. In today’s threat landscape, a single security check at login or transaction is no … More →
The post Akamai strenghtens protection against account abuse appeared first on Help Net Security.
CISA Releases Three Industrial Control Systems Advisories
CISA released three Industrial Control Systems (ICS) advisories on October 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-303-01 Siemens InterMesh Subscriber Devices
- ICSA-24-303-02 Solar-Log Base 15
- ICSA-24-303-03 Delta Electronics InfraSuite Device Master
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
Apple Releases Security Updates for Multiple Products
Apple released security updates to address vulnerabilities in multiple Apple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following advisories and apply necessary updates:
JCDC’s Industry-Government Collaboration Speeds Mitigation of CrowdStrike IT Outage
CISA, through the Joint Cyber Defense Collaborative (JCDC), enabled swift, coordinated response and information sharing in the wake of a significant IT outage caused by a CrowdStrike software update. This outage, which impacted government, critical infrastructure, and industry across the globe, led to disruptions in essential services, including air travel, healthcare, and financial operations.
Leveraging its unique ability to bring together public and private sector partners, JCDC facilitated virtual engagements with over 1,000 federal agency representatives. In close collaboration with CrowdStrike, a JCDC partner, CISA provided critical updates, mitigation guidance, and analysis on the potential for malicious exploitation of the outage. This rapid coordination enabled key information to be quickly disseminated across federal networks, helping to expedite mitigation and protect U.S. government systems.
This successful response underscores JCDC’s essential role in uniting industry and government partners to address cyber challenges that could impact national security and resilience. For more information about JCDC’s efforts, visit the JCDC Success Stories webpage and CISA.gov/JCDC.
Suspicious Social Media Accounts Deployed Ahead of COP29
Connected car security: Software complexity creates bumps in the road
Modern vehicles are essentially computers on wheels, with interconnected software-enabled systems such as advanced driver assistance systems (ADAS), keyless entry, onboard diagnostics, infotainment, and battery management functions. Many of these components support internet connectivity for over-the-air (OTA) software updates, remote access, and real-time monitoring.
The post Connected car security: Software complexity creates bumps in the road appeared first on Security Boulevard.
Last Week in Security (LWiS) - 2024-10-28
“商户洗钱”成为趋势,威胁猎人反洗钱情报助力金融机构洗钱风险治理
Fog and Akira ransomware attacks exploit SonicWall VPN flaw CVE-2024-40766
T0级事故,亚信安全防病毒把微信误杀了?
Спидран по эволюции за 30 лет: мастер-класс от морских улиток
RedLine and META Infostealers Infrastructure Seized by Authorities
An international coalition led by the U.S. Department of Justice has dismantled the infrastructure behind the notorious RedLine and META infostealers. These malware variants have plagued millions of computers worldwide, stealing sensitive information and facilitating further cybercriminal activities. Operation Magnus was a joint effort involving the US Department of Justice, FBI, Naval Criminal Investigative Service, […]
The post RedLine and META Infostealers Infrastructure Seized by Authorities appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.