Aggregator
CVE-2024-23352 | Qualcomm Snapdragon Auto up to XR2 5G Platform Registration infinite loop
CVE-2024-21479 | Qualcomm Snapdragon Auto up to XR2 5G Platform ALAC Content buffer over-read
CVE-2024-23355 | Qualcomm Snapdragon Auto up to XR2 5G Platform Shared Key Import memory corruption
CVE-2024-21481 | Qualcomm Snapdragon Auto up to XR2 5G Platform Resource Manager memory corruption
CVE-2024-21467 | Qualcomm Snapdragon up to X65 5G Modem-RF System Beacon Probe Frame buffer over-read
CVE-2024-21459 | Qualcomm Snapdragon Auto up to XR2 5G Platform Response Frame buffer over-read
CVE-2024-23350 | Qualcomm Snapdragon Auto/Snapdragon Mobile up to X75 5G Modem-RF System DL NAS Transport assertion
【2025合作伙伴巡礼】中锐电子—数智配侦解决方案提供商
New LianSpy malware hides by blocking Android security feature
Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail
Sonar’s R&D team discovered a Cross-Site Scripting vulnerability in Roundcube. Similar vulnerabilities in Roundcube have been used by APTs to steal government emails.
The post Government Emails at Risk: Critical Cross-Site Scripting Vulnerability in Roundcube Webmail appeared first on Security Boulevard.
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning appeared first on Security Boulevard.
USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning
Authors/Presenters:Viktor Valadi, AI Sweden; Xinchi Qiu, Pedro Porto Buarque de Gusmão, Nicholas D. Lane, Mina Alibeigi
Many thanks to USENIX for publishing their outstanding USENIX Security ’23 Presenter’s content, and the organizations strong commitment to Open Access. Originating from the conference’s events situated at the Anaheim Marriott; and via the organizations YouTube channel.
The post USENIX Security ’23 – FedVal: Different Good Or Different Bad In Federated Learning appeared first on Security Boulevard.
5th August – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 5th August, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES American blood donation center OneBlood has been a victim of a ransomware attack that caused disruption to its software system, affecting operations across more than 350 hospitals in Florida, Georgia, and the […]
The post 5th August – Threat Intelligence Report appeared first on Check Point Research.
SSRF骚思路
AI Policy and Governance: Shaping the Future of Artificial Intelligence
Learn why AI policy is vital for ethical development and how regulations like the EU AI Act shape the future.
The post AI Policy and Governance: Shaping the Future of Artificial Intelligence appeared first on Scytale.
The post AI Policy and Governance: Shaping the Future of Artificial Intelligence appeared first on Security Boulevard.
G.O.S.S.I.P 阅读推荐 2024-08-05 DIVER
Bloody Wolf Attacking Organizations With $80 Malware From Underground Market
Cybersecurity experts have uncovered a series of attacks targeting organizations in Kazakhstan by a threat actor dubbed “Bloody Wolf.” The group utilizes STRRAT, an inexpensive but potent malware available on underground forums for as little as $80. Since late 2023, researchers at BI.ZONE Threat Intelligence has been tracking Bloody Wolf’s activities. The attackers employ sophisticated […]
The post Bloody Wolf Attacking Organizations With $80 Malware From Underground Market appeared first on Cyber Security News.
Malware goes undetected by hiding malicious code in uncommon MS Access format
Novel SLUBStick Linux Exploit Gives Attackers Full System Control
A novel Linux kernel exploit technique called SLUBStick has proven to be 99% successful running the kind of attacks that in the past had a success rate of about 40% and allows bad actors to take total control of a system.
The post Novel SLUBStick Linux Exploit Gives Attackers Full System Control appeared first on Security Boulevard.