Aggregator
CVE-2017-2388 | Apple macOS up to 10.12.3 IOFireWireFamily null pointer dereference (HT207615 / EDB-40961)
CVE-2024-10497 | Schneider Electric PowerLogic HDPM6000 0.62.7 authorization (SEVD-2025-014-08)
CVE-2024-10498 | Schneider Electric PowerLogic HDPM6000 up to 0.62.7 memory corruption (SEVD-2025-014-08)
CVE-2024-12703 | Schneider Electric RemoteConnect and SCADAPack x70 Utilities deserialization (SEVD-2025-014-06)
CVE-2006-4089 | Alsaplayer cdda_engine.c cddb_lookup memory corruption (EDB-28367 / Nessus ID 22286)
CVE-2007-2446 | Samba up to 3.0.25 memory corruption (VU#773720 / EDB-9950)
What is a Network Security Audit and How It Ensures Your Data Stays Safe?
CVE-1999-0991 | GoodTech Telnet Server Nt 2.2.1 Login Name memory corruption (EDB-19666 / XFDB-3948)
Цифровой спасатель: на Госуслугах появится экстренная кнопка
False comunicazioni del Ministero della Salute sfruttate per phishing finanziario
CVE-2010-1057 | Phpkobo AdFreely 1.01 staff/file.php LANG_CODE path traversal (EDB-11722 / XFDB-56865)
INC
INC
Social Engineering to Disable iMessage Protections
Anyone taken a black hat on demand course?
Star Blizzard Targets WhatsApp in New Campaign
CISA and FBI Release Updated Guidance on Product Security Bad Practices
In partnership with the Federal Bureau of Investigation (FBI), CISA released an update to joint guidance Product Security Bad Practices in furtherance of CISA’s Secure by Design initiative. This updated guidance incorporates public comments CISA received in response to a Request for Information, adding additional bad practices, context regarding memory-safe languages, clarifying timelines for patching Known Exploited Vulnerabilities (KEVs), and other recommendations.
While this voluntary guidance is intended for software manufacturers who develop software products and services in support of critical infrastructure, all software manufacturers are strongly encouraged to avoid these product security bad practices.
CISA and FBI urge software manufacturers to reduce customer risk by prioritizing security throughout the product development process. For more information and resources, visit CISA’s Secure by Design webpage or learn how to take CISA’s Secure by Design Pledge.