Aggregator
OnDemand: Introduction to Sustainability Data Management
FBI Updates on Vast Chinese Hack on Telecom Networks
The FBI and Cybersecurity and Infrastructure Security Agency released an update on their ongoing investigation into a Chinese-linked "broad and significant cyberespionage campaign" that the agencies said targeted private communications of government and political figures.
Cryptohack Roundup: FTX Files Lawsuits to Recover Funds
This week, FTX sued to recover money, FTX's Caroline Ellison began her prison sentence, South Korea arrested hundreds in $232M scam, a guilty plea in a $73M pig-butchering case, BlueNoroff launched a new attack campaign, GodFather malware and WonderFi CEO kidnapped and released after ransom payment.
NIST Still Struggling to Clear Massive Vulnerability Backlog
The National Institute of Standards and Technology is still struggling with a backlog of over 19,000 security vulnerabilities in its National Vulnerability Database, according to a recent announcement, which acknowledged initial projections to clear the unassessed software flaws were too optimistic.
DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller
Authors/Presenters: Timm Lauser, Jannis Hamborg
Our sincere appreciation to DEF CON, and the Presenters/Authors for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Redefining V2G: How To Use Your Vehicle As Game Controller appeared first on Security Boulevard.
CVE-2024-10397 | OpenAFS up to 1.6.24/1.8.12.2/1.9.1 out-of-bounds write
CVE-2024-10825 | Hide My WP Ghost Plugin up to 5.3.01 on WordPress cross site scripting
CVE-2024-10793 | WP Activity Log Plugin up to 5.2.1 on WordPress User_id cross site scripting
CVE-2024-10260 | Tripetto Plugin up to 8.0.3 on WordPress Form File Upload cross site scripting
CVE-2024-10113 | WP AdCenter Plugin up to 2.5.7 on WordPress Shortcode wpadcenter_ad cross site scripting
CVE-2024-10897 | Tutor LMS Elementor Addons Plugin up to 2.1.5 on WordPress Limited Plugin Installation authorization
CVE-2024-9356 | Yotpo Plugin up to 1.7.8 on WordPress cross site scripting
CVE-2024-10396 | OpenAFS up to 1.6.24/1.8.12.2/1.9.1 improper validation of syntactic correctness of input
CVE-2024-10582 | Music Player for Elementor Plugin up to 2.4.1 on WordPress Template Import authorization
CVE-2024-52396 | realmag777 WOLF Plugin up to 1.0.8.3 on WordPress path traversal
CVE-2024-6068 | Rockwell Automation Arena Input Analyzer up to 16.20.03 DFT File Parser improper validation of specified quantity in input
Generating High Quality Test Data for MySQL Through De-identification and Synthesis
As one of the most popular open-source databases, widely used for web applications, MySQL is no stranger to PII and sensitive data. At the same time, its users need production-like data for effective development and testing. Here are the challenges involved in anonymizing MySQL databases and solutions for tackling them.
The post Generating High Quality Test Data for MySQL Through De-identification and Synthesis appeared first on Security Boulevard.
How to Mask Sensitive Data in Files, from CSV to JSON
Tonic’s file connector is a quick and easy way to get de-identified data to power your development. Simply upload data in files (such as CSV) to detect and mask sensitive data, and then generate new output files for safe, fast use.
The post How to Mask Sensitive Data in Files, from CSV to JSON appeared first on Security Boulevard.