Aggregator
CVE-2023-29160 | Fuji Electric FRENIC RHC Loader 1.1.0.3 FNE File stack-based overflow
CVE-2023-29167 | Fuji Electric FRENIC RHC Loader 1.1.0.3 FNE File information disclosure
CVE-2023-29498 | Fuji Electric FRENIC RHC Loader up to 1.1.0.3 Project File xml external entity reference
CVE-2023-27837 | TP-LINK TL-WPA8630P 171011 sub_40A774 key command injection
CVE-2022-28550 | jhead 3.06 jhead.c shellescape stack-based overflow (Issue 51)
CVE-2023-29562 | TP-Link TL-WPA7510 (EU)_V2_190125 /admin/locale operation stack-based overflow
CVE-2023-38944 | Multilaser RE160V/RE163V 12.03.01.09_pt/12.03.01.10_pt Web Management Interface RouterCfm.cfg access control
Bad Tenable plugin updates take down Nessus agents worldwide
FireScam Android info-stealing malware supports spyware capabilities
Thousands of BeyondTrust Systems Remain Exposed
CVE-2002-0599 | Blahz-DNS 0.2 Authentication dostuff.php improper authentication (EDB-21426 / XFDB-8951)
36 Chrome Extensions Compromised in Supply Chain Attack
A supply chain attack that subverted legitimate Google Chrome browser extensions to inject data-stealing malware is more widespread than security researchers first suspected. So far researchers have identified 36 subverted extensions collectively used by 2.6 million people.
US Sanctions Beijing Company for Flax Typhoon Hacking
The Department of Treasury blacklisted Integrity Technology Group, declaring transactions with the company to be off-limits for U.S. financial institutions and persons. The effect will likely have more symbolic than actual disruptive effect.
Apple's AI Photo Analyzer Faces Privacy Backlash
Apple's artificial intelligence-led photo analyzer is raising privacy concerns months after the company appears to have enabled the feature by default. It uses a combination of on-device machine learning and encrypted cloud-based processing.
Dental Practice Pays State in Alleged Data Breach 'Cover Up'
An Indiana dental practice agreed to pay the state $350,000 and implement a long list of data security improvements following an alleged 2020 ransomware breach "cover up" that came to light when state regulators investigated a patient complaint about unfulfilled requests for dental X-rays.
Feel Relieved: Advanced Secrets Management Techniques
Could Advanced Secrets Management be Your Way to Feeling Relieved? Think about it. If you could significantly decrease the likelihood of security breaches and data leaks in your organization, wouldn’t that be a massive weight lifted off your shoulders? But how to systematically fortify your cybersecurity? The answer lies in Non-Human Identities (NHIs) and Secrets […]
The post Feel Relieved: Advanced Secrets Management Techniques appeared first on Entro.
The post Feel Relieved: Advanced Secrets Management Techniques appeared first on Security Boulevard.
Ensure Your Data’s Safety: Best Practices in Cloud Security
Where Does Your Cloud Security Stand? Does your organization’s data management strategy consider non-human identities (NHIs) and secret security management? In the intricate dance of safeguarding data, ensuring the security of machine identities, or NHIs, and their corresponding secrets is pivotal. This practice remains an essential element of best cloud security practices and an effective […]
The post Ensure Your Data’s Safety: Best Practices in Cloud Security appeared first on Entro.
The post Ensure Your Data’s Safety: Best Practices in Cloud Security appeared first on Security Boulevard.
Imperva’s Wildest 2025 AppSec Predictions
Humans are spectacularly bad at predicting the future. Which is why, when someone appears to be able to do it on a regular basis, they are hailed as visionaries, luminaries and celebrated with cool names like Nostradamus and The Amazing Kreskin. Nostradamus made his fame on predictions about the distant future, but that technique has […]
The post Imperva’s Wildest 2025 AppSec Predictions appeared first on Blog.
The post Imperva’s Wildest 2025 AppSec Predictions appeared first on Security Boulevard.