Aggregator
CVE-2024-34392 | libxmljs up to 1.0.11 namespaces type confusion (ID 646)
CVE-2024-34393 | libxmljs2 up to 0.33.0 XML attrs type confusion (ID 204)
CVE-2024-34394 | libxmljs2 up to 0.33.0 namespaces type confusion (ID 205)
CVE-2024-5565 | Vanna Library Ask API injection (jfsa-2024-0010)
CVE-2024-7340 | Weave Traverse up to 0.50.7 path traversal (jfsa-2024-0010)
CVE-2024-23357 | Qualcomm Snapdragon Auto up to SD RSA Key null pointer dereference
CVE-2024-50311 | graphql Batching denial of service
CVE-2024-53082 | Linux Kernel up to 6.1.116/6.6.60/6.11.7 virtio_net virtnet_probe out-of-bounds (Nessus ID 211777)
CVE-2024-53088 | Linux Kernel up to 5.15.171/6.1.116/6.6.60/6.11.7 i40e_add_filter race condition (Nessus ID 211777)
CVE-2024-53068 | Linux Kernel up to 6.6.60/6.11.7 scmi_bus_notifier use after free (15b17bbcea07/1e1f523b185a/295416091e44)
PyPI Python Library "aiocpa" Found Exfiltrating Crypto Keys via Telegram Bot
BotPoke Scanner Switches IP
Malware campaign abused flawed Avast Anti-Rootkit driver
In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity
Several macro-trends – such as growing digital transformation, rising hybrid work and, especially, booming AI adoption – have created an increasingly sophisticated threat landscape.
The post In a Growing Threat Landscape, Companies Must do Three Things to Get Serious About Cybersecurity appeared first on Security Boulevard.
How to Protect Mission-Critical Insurance Operations to Reduce Network and Service Disruptions
Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed
A strategic approach to achieving speed without sacrificing protection requires a deliberate focus on application connectivity.
The post Better Prioritization and Network Clarity Can Close the Gap Between Application Security and Speed appeared first on Security Boulevard.
CVE-2020-28249 | Joplin 1.2.6 Note cross site scripting (EDB-49024)
Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together
A cyber risk assessment is a tool that helps organizations identify and prioritize risks associated with threats that are relevant to their unique environment.
The post Defining Cyber Risk Assessment and a Compliance Gap Analysis and How They Can be Used Together appeared first on Security Boulevard.