Aggregator
CVE-2024-10999 | CodeAstro Real Estate Management System 1.0 About Us Page /aboutadd.php aimage unrestricted upload
ThreeAM
CVE-2024-26672 | Linux Kernel up to 6.7.3 amdgpu_mca_smu_get_mca_entry null pointer dereference (7b5d58c07024/4f32504a2f85 / Nessus ID 210815)
CVE-2024-26662 | Linux Kernel up to 6.6.16/6.7.4 Display dcn21_set_backlight_level null pointer dereference (2e150ccea131/0c863cab0e91/e96fddb32931 / Nessus ID 210815)
CVE-2024-26660 | Linux Kernel up to 5.15.148/6.1.77/6.6.16/6.7.4 Stream Encoder Creation stream_enc_regs buffer overflow (Nessus ID 210815)
G.O.S.S.I.P 阅读推荐 2024-11-13 K-Hunt++
美中央情报局(CIA)网络情报中心
Fortinet Patches Critical Flaws That Affected Multiple Products
Fortinet, a leading cybersecurity provider, has issued patches for several critical vulnerabilities impacting multiple products, including FortiAnalyzer, FortiClient, FortiManager, and FortiOS. These vulnerabilities could allow attackers to perform unauthorized operations, escalate privileges, or hijack user sessions. Below are detailed descriptions of the key vulnerabilities, their impact, and the recommended fixes. 1. Read-Only Users Could Run […]
The post Fortinet Patches Critical Flaws That Affected Multiple Products appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-47574 | Fortinet FortiClientWindows up to 6.4.10/7.0.12/7.2.4/7.4.0 Named Pipe Message authentication bypass (FG-IR-24-199 / Nessus ID 210873)
Шпионаж по-итальянски: RCS Labs создала империю слежки за €150 в сутки
微软 Edge 再次试图自动导入 Chrome 数据
Palo Alto Networks Emphasizes Hardening Guidance
Updated November 15, 2024
Palo Alto Networks (PAN) has updated their informational bulletin, noting they "observed threat activity exploiting an unauthenticated remote command execution vulnerability against a limited number of firewall management interfaces which are exposed to the Internet."
CISA continues to urge users and administrators to review the following for more information, follow PAN’s guidance for hardening network devices, review PAN’s instruction for accessing organization’s scan results for internet-facing management interfaces, and take immediate action if required:
- PAN-SA-2024-0015 Important Informational Bulletin: Ensure Access to Management Interface is Secured
- Tips & Tricks: How to Secure the Management Access of Your Palo Alto Networks Device
End of Update
Palo Alto Networks (PAN) has released an important informational bulletin on securing management interfaces after becoming aware of claims of an unverified remote code execution vulnerability via the PAN-OS management interface.
CISA urges users and administrators to review the following for more information, follow PAN’s guidance for hardening network devices, review PAN’s instruction for accessing organization’s scan results for internet-facing management interfaces, and take immediate action if required:
Digital Identities: Getting to Know the Verifiable Digital Credential Ecosystem
Самолюбие ценой в 15 лет: как геймер сливал гостайны США в Discord
Rakuten Viber unveils new security solutions for businesses
Rakuten Viber has launched new solutions to further protect communication on the platform. Businesses can now quickly authenticate users to enhance trust and reduce fraud, making interactions more secure. Verification messages provide a secure and seamless way to authenticate clients through one-time passwords (OTPs). With ready-made templates designed to increase conversions, businesses can send encrypted OTPs at lower costs than SMS and at a pre-defined delivery time. When users receive a Viber verification message, they … More →
The post Rakuten Viber unveils new security solutions for businesses appeared first on Help Net Security.
Study Reveals Security Teams Feel the Impact of Rising API Threats
China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware
A Chinese state-sponsored threat group, identified as TAG-112, has been discovered hijacking Tibetan community websites to deliver Cobalt Strike malware, according to a recent investigation by Recorded Future’s Insikt Group. According to a report from Recorded Future, the investigation revealed that TAG-112 compromised at least two websites belonging to Tibetan organizations: Tibet Post (tibetpost[.]net) and Gyudmed Tantric University (gyudmedtantricuniversity[.]org). […]
The post China-Nexus Actors Hijack Websites to Deliver Cobalt Strike malware appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.