Aggregator
CVE-2022-37623 | thlorenz browserify-shim 3.8.15 resolve-shims.js resolveShims shimPath prototype pollution (Issue 248)
CVE-2022-40488 | ProcessWire 3.0.200 cross-site request forgery
CVE-2022-3360 | LearnPress Plugin up to 4.1.6 on WordPress REST API Endpoint wp_hash deserialization
CVE-2022-3334 | Easy WP SMTP Plugin up to 1.4.x on WordPress Admin Import File deserialization
CVE-2022-3357 | Smart Slider 3 Plugin prior 3.5.1.11 on WordPress Imported File deserialization
CVE-2022-3366 | PublishPress Capabilities Plugin up to 2.5.1 on WordPress File Import deserialization
CVE-2022-3374 | Ocean Extra Plugin up to 2.0.4 on WordPress Imported File deserialization
CVE-2022-3096 | WP Total Hacks Plugin up to 4.7.2 on WordPress Setting cross site scripting
CVE-2022-3237 | WP Contact Slider Plugin up to 2.4.7 on WordPress Setting cross site scripting
CVE-2022-40617 | strongSwan up to 5.9.7 Revocation Plugin resource consumption (FEDORA-2022-525510c815 / Nessus ID 211099)
Smart Strategies for NHI Deployment
Why Does NHI Management Matter in Today’s Cybersecurity Landscape? Data breaches, hacking and cyber threats are at an all-time high, making cybersecurity a crucial priority for businesses. So, how can organizations effectively secure their digital assets and eliminate potential risks? The answer lies in smart NHI strategies and efficient deployment. But what does this mean, […]
The post Smart Strategies for NHI Deployment appeared first on Entro.
The post Smart Strategies for NHI Deployment appeared first on Security Boulevard.
NSO Group owes $168M in damages to WhatsApp over spyware infections, jury says
It’s a major ruling in a landmark lawsuit that has had plenty of twists and turns — with more likely to come.
The post NSO Group owes $168M in damages to WhatsApp over spyware infections, jury says appeared first on CyberScoop.
Researcher Says Patched Commvault Bug Still Exploitable
Qilin
Live Webinar | Lateral Movement to Credential Theft: How Endpoint and Identities are Interconnected
Gen AI Startups Are Embedding AI Into Product Architecture
Arik Kleinstein, co-founder and managing partner, Glilot Capital Partners, says startups have an advantage over incumbents because they don't have to deal with legacy technology. But he shared some steps startups can take to secure their data and AI models.
Kelly Benefits Hack Victim Count Jumps Significantly, Again
The count of individuals affected by a hack discovered in December 2024 by Maryland-based Kelly & Associates Insurance Group continues to climb with a new total of 413,032 - up by nearly 150,000 since the company updated its breach disclosure last month. The list of clients affected has also grown.
AI and Infrastructure Resilience Are Keys to US Security
Anne Neuberger, former deputy national security advisor for cyber and emerging technologies, White House, outlines the urgent need for resilient critical infrastructure, strategic AI use in cybersecurity, and enhanced federal-state coordination to protect against evolving cyberthreats.
Retail Sector in Scattered Spider Crosshairs
The teenage hackers behind Scattered Spider tend to launch attacks in waves against specific sectors - and it may be the retail sector's turn. High street British mainstays Marks & Spencer, Co-op and Harrods have all felt a wave of incidents.