Aggregator
CISA Adds One Known Exploited Vulnerability to Catalog
CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-28986 SolarWinds Web Help Desk Deserialization of Untrusted Data Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
CISA Releases Eleven Industrial Control Systems Advisories
CISA released eleven Industrial Control Systems (ICS) advisories on August 15, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-228-01 Siemens SCALANCE M-800, RUGGEDCOM RM1224
- ICSA-24-228-02 Siemens INTRALOG WMS
- ICSA-24-228-03 Siemens Teamcenter Visualization and JT2Go
- ICSA-24-228-04 Siemens SINEC Traffic Analyzer
- ICSA-24-228-05 Siemens LOGO! V8.3 BM Devices
- ICSA-24-228-06 Siemens SINEC NMS
- ICSA-24-228-07 Siemens Location Intelligence
- ICSA-24-228-08 Siemens COMOS
- ICSA-24-228-09 Siemens NX
- ICSA-24-228-10 AVEVA Historian Web Server
- ICSA-24-228-11 PTC Kepware ThingWorx Kepware Server
CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations.
Rivers Of Phish – New Phishing Campaign Attacks Russia Enemies Globally
In collaboration with Access Now and other civil society organizations, Citizen Lab exposed a sophisticated attack dubbed as “Rivers of Phishing,” a new phishing campaign that attacks Russia’s enemies globally. The fact-finding efforts revealed that their coordinated spear-phishing targeted particular individuals across multiple countries and sectors of civil society. The threat actor adopted advanced digital […]
The post Rivers Of Phish – New Phishing Campaign Attacks Russia Enemies Globally appeared first on Cyber Security News.
Your Employees are Already Using GenAI. How Will You Communicate the Security Risks?
Did you know that 75% of people are already using Generative AI (GenAI) at work? GenAI tools are defined as any artificial intelligence that can generate content such as text, images, videos, code, and other data using generative models, often in response to prompts. Examples include Open AI’s ChatGPT, GitHub’s Copilot, Claude, Dall-E, Gemini, and […]
The post Your Employees are Already Using GenAI. How Will You Communicate the Security Risks? appeared first on CybeReady.
The post Your Employees are Already Using GenAI. How Will You Communicate the Security Risks? appeared first on Security Boulevard.
Russian-Linked Hackers Target Eastern European NGOs and Media
От 4K до 18K: терагерцевый чип откроет новые горизонты стриминга
The Key Components of HRIPA Compliance
Data breaches and privacy concerns are all too common today. That’s why the Australian Health Records and Information Privacy Act 2002 (HRIPA) is highly relevant. This legislation ensures that your privacy is rigorously protected when you share your medical history or undergo a procedure. HRIPA mandates strict protocols for healthcare providers, requiring them to handle […]
The post The Key Components of HRIPA Compliance appeared first on Centraleyes.
The post The Key Components of HRIPA Compliance appeared first on Security Boulevard.
Pythia: ключ к обнаружению скрытых угроз в сети c открытым кодом
Dragon: камеры iPhone сделают английский футбол справедливее
【已复现】Windows TCP/IP IPv6远程拒绝服务/代码执行漏洞(CVE-2024-38063)安全风险通告
Google Warns of Iranian Cyber-Attacks on Presidential Campaigns
Windows 11 v24H2 将默认启用 BitLocker 设备加密
地缘信息知识星球(8月15日更新明细)
手机GPS在关闭状态下如何追踪用户轨迹
Дипфейки в рекламе: у голоса теперь есть цена
August Product Update
The team at CyberSaint is thrilled to announce the latest additions and updates made to the CyberStrong solution. These latest updates will focus on reporting and remediation. To start off, we’ve made it easier to customize reporting with our latest changes to remediation reports. Additionally, we’ve implemented revisions to the RoSI calculations for enhanced risk analysis and introduced custom risk values and presets.
The post August Product Update appeared first on Security Boulevard.