Aggregator
Default User SSH Authorized Key Risks on Linux
CVE-2015-5560 | Adobe Flash Player 11.2.202.491/18.0.0.209 numeric error (APSB15-19 / EDB-37882)
年轻人更可能死于高温
CVE-2023-42918 | Apple macOS up to 13.x sandbox
CVE-2023-42959 | Apple macOS up to 13.x race condition
CVE-2023-42958 | Apple macOS up to 13.3 permission
CVE-2024-42038 | Huawei HarmonyOS/EMUI Lock Screen Module cryptographic issues
CVE-2024-50186 | Linux Kernel up to 5.15.167/6.1.112/6.6.56/6.11.3 sk_common_release allocation of resources (Nessus ID 211829)
CVE-2024-50184 | Linux Kernel up to 5.10.226/5.15.167/6.1.112/6.6.56/6.11.3 virtio_pmem virtio_pmem_flush unusual condition
CVE-2024-50185 | Linux Kernel up to 5.10.227/5.15.168/6.1.112/6.6.56/6.11.3 mptcp assertion
CVE-2024-42149 | Linux Kernel up to 6.9.8 fs_bdev_thaw denial of service (25b1e3906e05/2ae4db5647d8 / Nessus ID 210060)
CVE-2024-42150 | Linux Kernel up to 6.9.8 MSI/INTx request_irq denial of service (850103ebe6b0/bd07a9817846 / Nessus ID 210060)
CVE-2024-42151 | Linux Kernel up to 6.9.8 dummy_st_ops/dummy_init_ret_value null pointer dereference (7f79097b0de9/1479eaff1f16 / Nessus ID 210060)
CVE-2024-49215 | Sangoma Asterisk/Certified Asterisk manager.c action_getconfig/action_getconfigJson path traversal
Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide
What is OSCAL? OSCAL provides a traceable and machine-readable data format for capturing and sharing security information. A standardized, continuous representation of an organization’s security controls helps prove compliance with NIST’s risk management framework for mandated federal agencies. FedRAMP joined with NIST to create the Open Security Controls Assessment Language (OSCAL), a standard that can […]
The post Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide appeared first on Centraleyes.
The post Leveraging NIST OSCAL to Provide Compliance Automation: The Complete Guide appeared first on Security Boulevard.
英伟达被立案调查;数据删除取代加密,新型勒索软件攻击或让企业面临更大风险 | 牛览
Preventing data leakage in low-node/no-code environments
Low-code/no-code (LCNC) platforms enable application development by citizen developers, often generating “shadow engineering” projects that evade security oversight. While LCNC solutions like Power BI reports and automated workflows foster agility and innovation, they also introduce significant risks, including data leakage. Data leakage risks in LCNC One of the biggest security concerns in LCNC environments is the inadvertent exposure of sensitive assets. Examples include: Misconfigured applications: LCNC-created assets like reports, data portals and AI agents may … More →
The post Preventing data leakage in low-node/no-code environments appeared first on Help Net Security.
《API安全技术应用指南(2024版)》报告发布
Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps
Researchers have uncovered that Large Language Models (LLMs) can generate and manipulate ANSI escape codes, potentially creating new security vulnerabilities in terminal-based applications. ANSI escape sequences are a standardized set of control characters used by terminal emulators to manipulate the appearance and behavior of text displays. They enable features such as text color changes, cursor movement, blinking text, and more. Terminal emulators interpret these sequences […]
The post Hackers Can Hijack Your Terminal Via Prompt Injection using LLM-powered Apps appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.