Aggregator
CVE-2024-46859 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 panasonic-laptop out-of-bounds
CVE-2024-46856 | Linux Kernel up to 6.10.10 dp83822 null pointer dereference (67b61e2f4c9c/3f62ea572b3e)
CVE-2024-46854 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 buffer overflow
CVE-2024-46849 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 axg-card meson_card_reallocate_links null pointer dereference
CVE-2024-46850 | Linux Kernel up to 6.10.10 AMD Display dcn35_set_drr state issue (42850927656a/e835d5144f5e)
The Top Windows Server Monitoring Tools Available Today
Introduction to Windows Server Monitoring Today’s organizations are deeply dependent on their IT infrastructure, so system downtime translates directly to costly business disruptions. Accordingly, it’s critical to have server monitoring tools that provide the insight into your on-premises and cloud systems you need to prevent and detect operational and security issues. Due to the heavy … Continued
Hackers Attacking AI Agents To Hijacking Customer Sessions
Conversational AI platforms, powered by chatbots, are witnessing a surge in malicious attacks, which leverage NLP and ML are increasingly being used by businesses to enhance productivity and revenue. While they offer personalized experiences and valuable data insights, they also pose significant privacy risks. The collection and retention of user data, including sensitive information, raises […]
The post Hackers Attacking AI Agents To Hijacking Customer Sessions appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Печать документов в Linux приводит к захвату компьютера
CVE-2024-46867 | Linux Kernel up to 6.10.10 show_meminfo deadlock (9d3de463e23b/9bd7ff293fc8)
CVE-2024-46857 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 mlx5 null pointer dereference
CVE-2024-46852 | Linux Kernel up to 6.1.110/6.6.51/6.10.10 dma-buf off-by-one
CVE-2024-46851 | Linux Kernel up to 6.10.10 AMD Display dcn10_set_drr/dc_state_destruct race condition (b6ce047a81f5/a7aeb03888b9)
CVE-2024-46866 | Linux Kernel up to 6.10.10 show_meminfo assertion (abc8feacacf8/94c4aa266111)
CVE-2024-46848 | Linux Kernel up to 6.1.109/6.6.50/6.10.9 on Haswell denial of service
CVE-2024-46846 | Linux Kernel up to 6.1.109/6.6.50/6.10.9 rockchip Privilege Escalation
CVE-2024-46864 | Linux Kernel up to 6.6.51/6.10.10 cpuhp_setup_state initialization (2ae1beb3ab4f/d6f018a3b49d/b9af6418279c)
Malicious App On Google Play Steals Cryptocurrency From Android Users
Cybercriminals have shifted their focus to mobile devices, targeting users with a malicious crypto drainer app disguised as the legitimate WalletConnect protocol, which remained undetected for over five months and was downloaded 10,000 times, exploited the name of the well-known Web3 protocol to deceive users. Despite its removal from Google Play, the app victimized over […]
The post Malicious App On Google Play Steals Cryptocurrency From Android Users appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.