Aggregator
ZDI-CAN-27122: Oracle
ZDI-CAN-26031: Fuji Electric
ZDI-CAN-27157: VMware
ZDI-CAN-27174: Microsoft
ZDI-CAN-27167: Microsoft
Тысячи школ, миллионы жертв и один 19-летний студент: задержан виновник взлома PowerSchool
CVE-2019-1051 | Microsoft Edge/ChakraCore Chakra Scripting Engine memory corruption (ID 91543)
CVE-2019-1052 | Microsoft Edge/ChakraCore Chakra Scripting Engine memory corruption (ID 91543)
CVE-2019-1055 | Microsoft Internet Explorer 9/10/11 Scripting Engine memory corruption (ID 100373)
CVE-2019-1065 | Microsoft Windows up to Server 2019 Kernel access control (ID 91544)
CVE-2019-1049 | Microsoft Windows 7 SP1/Server 2008 R2 SP1/Server 2008 SP2 GDI information disclosure (ID 91544)
CVE-2019-1050 | Microsoft Windows up to Server 2019 GDI information disclosure (ID 91544)
CVE-2019-1053 | Microsoft Windows up to Server 2019 Windows Shell access control (ID 91544)
CVE-2019-1054 | Microsoft Edge MOTW 7pk security (ID 91543)
CVE-2019-1080 | Microsoft Internet Explorer 9/10/11 Scripting Engine memory corruption (ID 100373)
Third-party cyber risks and what you can do
When a third-party tech vendor suffers a cyber incident, your business can feel the effects immediately. That’s why it’s crucial to treat vendor risk as part of your cybersecurity posture. In this Help Net Security video, Mike Toole, Director of Security and IT at Blumira, explores why visibility into your vendor ecosystem is essential: from understanding which vendors you use and what data they access, to how they protect it. Learn how to build third-party … More →
The post Third-party cyber risks and what you can do appeared first on Help Net Security.
CVE-2022-42889 | Oracle Retail Xstore Point of Service 18.0.5/19.0.4/20.0.3/21.0.2 Xenvironment code injection (EDB-52261 / Nessus ID 216682)
第三届京麒CTF开赛 倒计时三天!
Nation-state APTs ramp up attacks on Ukraine and the EU
Russian APT groups intensified attacks against Ukraine and the EU, exploiting zero-day vulnerabilities and deploying wipers, according to ESET. Ukraine faces rising cyber threats The Russia-aligned Sandworm group intensified destructive operations against Ukrainian energy companies, deploying a new wiper named ZEROLOT. Gamaredon remained the most prolific actor targeting Ukraine, enhancing malware obfuscation and introducing PteroBox, a file stealer leveraging Dropbox. “The infamous Sandworm group concentrated heavily on compromising Ukrainian energy infrastructure. In recent cases, it … More →
The post Nation-state APTs ramp up attacks on Ukraine and the EU appeared first on Help Net Security.