Aggregator
CrowdStrike trying to use legal threats to suppress criticism and parody of global IT outage
Keep Your Data Safe with This PII Compliance Checklist
Ryan Pentney reflects on 10 years of Talos and his many roles from the Sourcefire days
How Long Does a DDoS Attack Last?
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2018-0824 Microsoft COM for Windows Deserialization of Untrusted Data Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
TikTok Withdraws Lite Rewards Program from EU Over Child Safety Fears
物理学家李政道去世,享年 97 岁
Луна под колесами: 53 года назад первый электромобиль освоил космос
BlankBot лишает пользователя доступа к смартфону
Russia's 'Fighting Ursa' APT Uses Car Ads to Install HeadLace Malware
弘扬数字时代青年力量,ISC.AI 2024漏洞生态与实战人才发展论坛召开
The Loper Bright Decision: How it Impacts Cybersecurity Law
「推安早报」0805 | 域安全、红蓝工具
Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad
Fighting Ursa, a Russian APT, has employed a car sales phishing lure to distribute the HeadLace backdoor malware targeting diplomats since March 2024. This strategy mirrors previous campaigns by the group and other Russian threat actors. The attack leveraged public, free infrastructure services and exploited user clicks on malicious content within the car advertisement. Hackers […]
The post Hackers Infect Windows With Backdoor Malware Via “Car For Sale” Ad appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
弘扬数字时代青年力量,ISC.AI 2024漏洞生态与实战人才发展论坛召开
ISC.AI 2024第二届全国信息安全产教融合发展大会圆满召开
ISC.AI 2024大型企业数字化转型安全发展论坛召开 为企业数转智改保驾护航
Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability
The notorious Mirai botnet has been observed exploiting a recently disclosed directory traversal vulnerability in Apache OFBiz. This Java-based framework, supported by the Apache Foundation, is used for creating ERP (Enterprise Resource Planning) applications, which are critical for managing sensitive business data despite being less prevalent than commercial alternatives. Vulnerability Details and Exploitation According to […]
The post Mirai Botnet Attacking Apache OFBiz Directory Traversal Vulnerability appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.
Hackers Abused StackExchange Platform To Deliuver Malicious Python Package
Attackers uploaded malicious Python packages targeting Raydium and Solana users to PyPI, leveraging a StackExchange post to distribute the malware. The multi-stage malware stole sensitive data, drained cryptocurrency wallets, and established persistent backdoor access, bypassing Windows security protections, underscoring the vulnerability of software supply chains and the ineffectiveness of traditional endpoint security solutions against modern […]
The post Hackers Abused StackExchange Platform To Deliuver Malicious Python Package appeared first on GBHackers on Security | #1 Globally Trusted Cyber Security News Platform.