Aggregator
CVE-2023-32683 | Matrix Synapse up to 1.84.x server-side request forgery (GHSA-98px-6486-j7qc / Nessus ID 234734)
CVE-2023-41335 | Matrix Synapse up to 1.92.x cleartext storage (GHSA-4f74-84v3-j9q5 / Nessus ID 234734)
CVE-2023-43796 | Matrix Synapse prior 1.95.1/1.96.0rc1 information disclosure (Nessus ID 234734)
CVE-2023-46045 | Graphviz up to 9.x config6a File out-of-bounds (Issue 2441 / Nessus ID 234748)
CVE-2025-30215 | NATS.io up to 2.10.26/2.11.0 JetStream Asset access control (Nessus ID 234744)
CVE-2024-53868 | Apache Traffic Server up to 9.2.9/10.0.4 Chunked Message Body request smuggling (Nessus ID 234749)
FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code
A critical vulnerability (CVE-2025-0618) in FireEye’s Endpoint Detection and Response (EDR) agent has been disclosed, enabling attackers to execute unauthorized code and trigger persistent denial-of-service (DoS) conditions. The flaw, rated high severity, impacts tamper protection mechanisms in FireEye’s HX service and could disrupt critical security operations indefinitely. Vulnerability Details The issue stems from improper handling […]
The post FireEye EDR Vulnerability Allows Attackers to Execute Unauthorized Code appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Vulnerability Exploitation and Credential Theft Now Top Initial Access Vectors
Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE
Tel Aviv, Israel, 23rd April 2025, CyberNewsWire
The post Lattica Emerges from Stealth to Solve AI’s Biggest Privacy Challenge with FHE appeared first on Security Boulevard.
Why Cybersecurity Needs to Focus More on Investigation
Stronger Cloud Security in Five: How To Protect Your Cloud Workloads
In the first installment of Tenable’s “Stronger Cloud Security in Five” blog series, we covered cloud security posture management (CSPM), which focuses on protecting your multi-cloud infrastructure by detecting misconfigurations. Today, we turn to securing cloud workloads, which are the applications and services — along with all the resources they need to function — that run within your multi-cloud infrastructure.
Because cloud environments are dynamic, distributed and multi-layered, securing cloud workloads is challenging, as their security posture can quickly shift. The variety of workloads — virtual machines, container images, databases, serverless functions, and more — adds to the complexity.
Also complicating matters: The deployment of cloud workloads on more than one cloud service provider (CSP), which requires that security teams protect workloads in multi-cloud environments.
In fact, an Enterprise Strategy Group (ESG) survey last year found that most organizations need to secure applications across multi-cloud environments. The report also found that almost all organizations suffered serious cybersecurity incidents.
As a result, 89% of organizations planned to invest more in cloud security platforms and DevSecOps, including in cloud workload protection platforms, ESG Cybersecurity Practice Director Melinda Marks explained.
Clearly, cloud workload integrity is essential. As the Cloud Security Alliance tells us in its “Security Guidance: For Critical Areas of Focus in Cloud Computing”: “For businesses using the cloud, securing these workloads is not just about protecting data. It is also about ensuring that their operations can continue without interruption.”
At Tenable, we believe that to secure your multi-cloud workloads, you need a cloud-native application protection platform (CNAPP) with a strong cloud workload protection solution that can help you prevent, detect and address exposures, including vulnerabilities, misconfigurations and insecure APIs.
“Choosing a security provider that has conflicting priorities can introduce risk. The best cloud security program is built on independence, transparency and aligned priorities around your security needs.” -- Tenable Chief Product Officer Shai Morag
Here are five key best practices for protecting your cloud workloads.
1 - Continuous and contextualized vulnerability managementIt’s critical to automate the continuous scanning of your cloud workloads to detect vulnerabilities across operating systems, containers, virtual machines, and more — whenever they crop up.
In addition, you need contextualized vulnerability analysis. Your CNAPP’s CWP tool must enrich the context of detected vulnerabilities with granular research information, including severity ratings and exploit details. This rich context will allow you to identify the riskiest vulnerabilities to your organization and prioritize remediation accordingly.
For example, you’ll be able to detect cloud workloads afflicted with toxic combinations, such as those that are publicly exposed and have critical vulnerabilities and excessive permissions. How prevalent is this “toxic trilogy”? The “Tenable Cloud Risk Report 2024” found that almost 40% of organizations have at least one toxic trilogy — and 27% have at least five.
2 - Cloud scanningTo protect workloads in a cloud-native manner, you’ll need an effective method to scan. Agentless scanning is one effective way to do just that. By using the APIs provided by CSPs to gather security data, agentless scanning protects workload performance and delivers a holistic view of your security posture at scale.
You get visibility into your cloud workload inventory, telemetry and risks, including vulnerabilities, data exposure, overprivileged identities, malware and misconfigurations across virtual machines, containers, serverless workloads and Kubernetes clusters. With this data in hand, you can establish sound priorities to guide your remediation efforts.
3 - Build-to-runtime container securityA critical component of cloud workload security is the protection of containers throughout their lifecycles — from build to deployment. This continuous, end-to-end container security also needs to be automated and baked into your DevOps workflows and CI/CD pipeline.
Such an automated and comprehensive approach is critical given the large number of containers in a typical cloud environment, the speed with which they’re spun up and down, and their ephemeral duration.
“For businesses using the cloud, securing these workloads is not just about protecting data. It is also about ensuring that their operations can continue without interruption.” -- Cloud Security Alliance
It all starts during the container build process. Your cloud workload protection platform (CWPP) must give your developers visibility into container risks, such as outdated operating system images and vulnerabilities. It should also empower developers to remediate the detected security flaws by giving them risk insights so they can prioritize remediation effectively.
You also need automated security scanning of the containers you check into registries, such as DockerHub and Amazon ECR.
Finally, containers should undergo automated security tests in production runtime environments because attackers will readily exploit buggy and misconfigured containers.
4 - Automated compliance monitoringImproperly securing your cloud workloads can have serious implications if your organization runs afoul of the numerous and complex cybersecurity laws and rules that apply to cloud computing.
Keeping your cloud workloads compliant with government regulations and industry standards requires a methodical, automated approach that can match your cloud environments’ quicksilver nature.
A CWP system that automatically identifies compliance violations and provides out-of-the-box policies and templates can dramatically simplify the thorny cloud compliance process.
5 - Centralized security visibility and managementYour CWP system should provide a unified, continuously updated and contextually rich view of your multi-cloud workload resources and their risks — and it should do this in an agnostic manner.
As Tenable Chief Product Officer Shai Morag pointed out recently: “Choosing a security provider that has conflicting priorities can introduce risk. The best cloud security program is built on independence, transparency and aligned priorities around your security needs.”
In ESG’s survey, respondents expressed a preference for consolidated solutions and platforms “to help provide better context, drive efficient actions, rapidly mitigate issues and save valuable time” instead of having to manually analyze results from separate solutions, ESG’s Marks said.
At Tenable, we believe that a centralized CWP user interface with multi-cloud visibility, security management and reporting gives your teams a single source of truth for cloud workload risks, allowing them to collaborate and prioritize remediation.
Learn how you can take action to boost your cloud security in just five minutes.
CVE-2010-0284 | Novell Access Manager up to 3.0 Administration Console path traversal (Nessus ID 47582 / XFDB-59528)
CVE-2010-2115 | SolarWinds TFTP Server 10.4.0.10 input validation (EDB-12683 / Nessus ID 47137)
CVE-2010-0103 | Energizer DUO USB up to 7777 Backdoor UsbCharger.dll code injection (VU#154421 / Nessus ID 45006)
CVE-2010-1423 | Oracle JDK 1.6.0 URI javaws.exe -XXaltjvm os command injection (VU#886582 / Nessus ID 45544)
CVE-2010-0185 | Adobe ColdFusion 9.0 Default Configuration access control (ID 116853 / XFDB-55997)
Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs
MITRE has released the latest version of its ATT&CK framework, which now also includes a new section (“matrix”) to cover the tactics, techniques and procedures (TTPs) used to target VMware ESXi hypervisors. About MITRE ATT&CK MITRE ATT&CK is a regularly updated public knowledge base that charts how real-world threat actors behave. It also lists known/documented threat actor groups, malware, and (some) past high-profile campaigns. It’s used by cyber defenders and vendors for threat modeling and … More →
The post Released: MITRE ATT&CK v17.0, now with ESXi attack TTPs appeared first on Help Net Security.
NinjaOne unifies vulnerability and patch management
NinjaOne announced new capabilities that unify vulnerability management and patching workflows, ensuring a risk-based approach to patching and reducing time to remediate vulnerabilities. The new tools automate the import of vulnerability data, giving IT teams continuous visibility into vulnerabilities, so they can prioritize and verify the successful applicationof patches, reducing organizations’ risk. “The rapid growth in the number and diversity of endpoint devices, driven by hybrid work and digital transformation, has significantly expanded organizational attack … More →
The post NinjaOne unifies vulnerability and patch management appeared first on Help Net Security.