Aggregator
CVE-2024-44002 | PickPlugins Team Showcase Plugin up to 1.22.25 on WordPress cross site scripting
CVE-2024-44003 | spicethemes Spice Starter Sites Plugin up to 1.2.5 on WordPress cross site scripting
Black Suit
X 发布首份透明度报告
CVE-2007-3883 | Datadynamics ActiveBar 3.1 ActiveX Control actbar3.ocx first Remote Code Execution (EDB-4190 / Nessus ID 54841)
黑客声称窃取了 8700 万条数据记录后,Temu 否认存在违规行为
WordPress vs WP Engine: корпоративная битва сделала уязвимыми 40% сайтов в интернете
Cisco Releases Security Updates for IOS and IOS XE Software
Cisco released its September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication to address vulnerabilities in IOS and IOS XE. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following and apply the necessary updates:
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on September 26, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-270-01 Advantech ADAM-5550
- ICSA-24-270-02 Advantech ADAM-5630
- ICSA-24-270-03 Atelmo Atemio AM 520 HD Full HD Satellite Receiver
- ICSA-24-270-04 goTenna Pro X and Pro X2
- ICSA-24-270-05 goTenna Pro ATAK Plugin
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises
Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), the Cybersecurity and Infrastructure Security Agency (CISA), and other U.S. and international partners released the joint guide Detecting and Mitigating Active Directory Compromises. This guide informs organizations of recommended strategies to mitigate common techniques used by malicious actors to compromise Active Directory.
Active Directory is the most widely used authentication and authorization solution in enterprise information technology (IT) networks globally. Malicious actors routinely target Active Directory as part of efforts to compromise enterprise IT networks by escalating privileges and targeting the highest confidential user objects.
Responding to and recovering from malicious activity involving Active Directory can be consuming, costly, and disruptive. CISA encourages organizations review the guidance and implement the recommended mitigations to improve Active Directory security.
To learn more about taking a top-down approach to developing secure products, visit CISA’s Secure by Design webpage.