Aggregator
CVE-2024-30724 | ROS Kinetic Kame 1 Node Privilege Escalation
CVE-2024-30726 | ROS Kinetic Kame 1 os command injection
CVE-2024-30723 | ROS Kinetic Kame 1 Node injection
CVE-2024-30722 | ROS Kinetic Kame 1 ROS Node denial of service
CVE-2024-30721 | ROS2 Dashing Diademata unrestricted upload
CVE-2024-30719 | ROS2 Dashing Diademata Inter-Process Communication deserialization
CVE-2024-30718 | ROS2 Dashing Diademata Package Privilege Escalation
CVE-2024-30716 | ROS2 Dashing Diademata information disclosure
CVE-2002-1560 | Martin Bauer gBook 1.4 Authentication index.php login improper authentication (EDB-21960 / XFDB-10455)
Patch Alert: Remotely Exploitable LDAP Flaws in Windows
Security experts are urging all organizations that use Microsoft Windows to ensure they install patches, released last month, to fix Lightweight Directory Access Protocol denial-of-service and remote code execution flaws. Researchers have released a proof-of-concept exploit for the latter flaw.
China's Hacking of US Telecoms: Officials Name More Victims
The nine known victims of a "broad and significant cyberespionage campaign" the White House has tied to China reportedly include Charter Communications, Consolidated Communications and Windstream, as officials said the hackers' earliest known telecom network penetration began in mid-2023.
Nuclei Patches High Severity Flaw in Security Tool
Open-source vulnerability scanner Nuclei patched a critical flaw in its open-source vulnerability management tool ProjectDiscovery. Security firm Wiz uncovered the flaw, a signature verification system flaw that could allow attackers to execute malicious code using custom code templates.
Live Webinar | Reducing Risk and Manual Effort in Identity Security Through AI
Patch Alert: Remotely Exploitable LDAP Flaws in Windows
Security experts are urging all organizations that use Microsoft Windows to ensure they install patches, released last month, to fix Lightweight Directory Access Protocol denial-of-service and remote code execution flaws. Researchers have released a proof-of-concept exploit for the latter flaw.
China's Hacking of US Telecoms: Officials Name More Victims
The nine known victims of a "broad and significant cyberespionage campaign" the White House has tied to China reportedly include Charter Communications, Consolidated Communications and Windstream, as officials said the hackers' earliest known telecom network penetration began in mid-2023.
Nuclei Patches High Severity Flaw in Security Tool
Open-source vulnerability scanner Nuclei patched a critical flaw in its open-source vulnerability management tool ProjectDiscovery. Security firm Wiz uncovered the flaw, a signature verification system flaw that could allow attackers to execute malicious code using custom code templates.
DEF CON 32 – Curious Case of Alice & Bob: What You Can Do as Digital Investigators
Authors/Presenters: Catherine Ullman
Our sincere appreciation to DEF CON, and the Authors/Presenters for publishing their erudite DEF CON 32 content. Originating from the conference’s events located at the Las Vegas Convention Center; and via the organizations YouTube channel.
The post DEF CON 32 – Curious Case of Alice & Bob: What You Can Do as Digital Investigators appeared first on Security Boulevard.
Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack
by Source Defense In a recent high-profile incident covered by Forbes, our Source Defense Research team identified a sophisticated Magecart attack targeting the European Space Agency’s online store. This case study demonstrates why leading organizations worldwide trust Source Defense to protect their client-side security. In the December 2024 incident, Forbes reported what it called “one
The post Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack appeared first on Source Defense.
The post Holiday Shopping Meets Cyber Threats: How Source Defense Detected the ESA Store Attack appeared first on Security Boulevard.