Aggregator
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
31 minutes 43 seconds ago
原域名已变更且将在2024年彻底废弃,请访问 https://govuln.com/news/ 查看新的RSS订阅
Webinar | Beyond the Gateway: Protecting Financial Data from Internal Email Threats
32 minutes 8 seconds ago
When AI Agents Go Rogue: Managing Digital Insider Risk
32 minutes 8 seconds ago
Clear the Cloud Noise: Integrating CNAPP for Unified Threat Response
32 minutes 8 seconds ago
Secure Every Access and Edge: Unified SASE for Data Protection
32 minutes 8 seconds ago
ClickFix Infrastructure Surprises Inform Better Blocking
32 minutes 8 seconds ago
Big Crossover Found Between ClickFix and Adversary-in-the-Middle Infrastructure
Tracking how cybercriminals and their service providers use malicious infrastructure can give defenders an edge for blocking their targeting. New research spotted a massive crossover between IP addresses used for both ClickFix and adversary-in-the-middle attacks.
Tracking how cybercriminals and their service providers use malicious infrastructure can give defenders an edge for blocking their targeting. New research spotted a massive crossover between IP addresses used for both ClickFix and adversary-in-the-middle attacks.
Cryptohack Roundup: Allegations Involving Melania Memecoins
32 minutes 8 seconds ago
Also: LastPass Warns of Phishing Campaign, Trump's New CTFC Head Pick
Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, Meteora CEO faced fraud allegations, LastPass warned of a phishing campaign, Trump taps crypto lawyer to lead CFTC, Mt. Gox delayed creditor repayments again and an Indian court blocked WazirX from using customer funds to cover hack losses.
Every week, Information Security Media Group rounds up cybersecurity incidents in digital assets. This week, Meteora CEO faced fraud allegations, LastPass warned of a phishing campaign, Trump taps crypto lawyer to lead CFTC, Mt. Gox delayed creditor repayments again and an Indian court blocked WazirX from using customer funds to cover hack losses.
Breach Roundup: Hackers Probe Canada's Critical Infrastructure
32 minutes 8 seconds ago
Also: F5 Revenue Dips, Swedish Utility Operator Breached
This week, critical infrastructure breaches in Canada, a Swedish grid operator breached, an Australian guilty of selling cyber exploits, Gmail wasn't breached, F5 projected a revenue dip, PhantomRaven targeted developers, a Pakistan-linked actor targeted India and Dentsu confirmed a data breach.
This week, critical infrastructure breaches in Canada, a Swedish grid operator breached, an Australian guilty of selling cyber exploits, Gmail wasn't breached, F5 projected a revenue dip, PhantomRaven targeted developers, a Pakistan-linked actor targeted India and Dentsu confirmed a data breach.
Sublime Secures $150M to Advance Agentic Email Protection
32 minutes 8 seconds ago
Series C Funding Fuels Autonomous Agents That Detect and Block Attacks in Real Time
Sublime Security closed a $150 million Series C round to expand its AI-driven agent platform. The Washington D.C.-based company aims to reduce cyber risk and manual workloads for defenders by adapting quickly to novel attacks, especially those using GenAI.
Sublime Security closed a $150 million Series C round to expand its AI-driven agent platform. The Washington D.C.-based company aims to reduce cyber risk and manual workloads for defenders by adapting quickly to novel attacks, especially those using GenAI.
CVE-2021-38648 | Microsoft Azure Open Management Infrastructure improper authentication
1 hour 53 minutes ago
A vulnerability was found in Microsoft Azure Open Management Infrastructure and classified as critical. The impacted element is an unknown function. Executing manipulation can lead to improper authentication.
This vulnerability is tracked as CVE-2021-38648. The attack is restricted to local execution. Moreover, an exploit is present.
It is best practice to apply a patch to resolve this issue.
vuldb.com
CVE-2021-38649 | Microsoft Azure Open Management Infrastructure Local Privilege Escalation
1 hour 53 minutes ago
A vulnerability was found in Microsoft Azure Open Management Infrastructure. It has been classified as critical. This affects an unknown function. The manipulation leads to Local Privilege Escalation.
This vulnerability is listed as CVE-2021-38649. The attack must be carried out locally. In addition, an exploit is available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2021-40449 | Microsoft Windows up to Server 2022 Win32k use after free
1 hour 53 minutes ago
A vulnerability labeled as very critical has been found in Microsoft Windows. This vulnerability affects unknown code of the component Win32k. Executing manipulation can lead to use after free.
The identification of this vulnerability is CVE-2021-40449. The attack may be launched remotely. Furthermore, there is an exploit available.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2021-43226 | Microsoft Windows up to Server 2022 Common Log File System Driver privilege escalation (WID-SEC-2025-2220)
1 hour 53 minutes ago
A vulnerability, which was classified as very critical, was found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Common Log File System Driver. The manipulation results in privilege escalation.
This vulnerability is reported as CVE-2021-43226. The attack can be launched remotely. Moreover, an exploit is present.
Applying a patch is advised to resolve this issue.
vuldb.com
CVE-2021-40450 | Microsoft Windows up to Server 2022 Win32k privilege escalation
1 hour 53 minutes ago
A vulnerability marked as very critical has been reported in Microsoft Windows. This issue affects some unknown processing of the component Win32k. The manipulation leads to privilege escalation.
This vulnerability is referenced as CVE-2021-40450. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is suggested to install a patch to address this issue.
vuldb.com
CVE-2021-41357 | Microsoft Windows up to Server 2022 Win32k privilege escalation
1 hour 53 minutes ago
A vulnerability described as very critical has been identified in Microsoft Windows up to Server 2022. The affected element is an unknown function of the component Win32k. Such manipulation leads to privilege escalation.
This vulnerability is uniquely identified as CVE-2021-41357. The attack can be launched remotely. Moreover, an exploit is present.
A patch should be applied to remediate this issue.
vuldb.com
CVE-2021-42278 | Microsoft Windows Server 20H2 up to Server 2019 Active Directory Domain Services privilege escalation
1 hour 53 minutes ago
A vulnerability, which was classified as critical, was found in Microsoft Windows. This vulnerability affects unknown code of the component Active Directory Domain Services. Such manipulation leads to privilege escalation.
This vulnerability is listed as CVE-2021-42278. The attack may be performed from remote. In addition, an exploit is available.
It is best practice to apply a patch to resolve this issue.
vuldb.com
CVE-2021-42287 | Microsoft Windows Server 20H2 up to Server 2019 Active Directory Domain Services privilege escalation
1 hour 53 minutes ago
A vulnerability labeled as critical has been found in Microsoft Windows. Affected by this vulnerability is an unknown functionality of the component Active Directory Domain Services. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2021-42287. The attack can be executed remotely. Additionally, an exploit exists.
It is best practice to apply a patch to resolve this issue.
vuldb.com
CVE-2021-34486 | Microsoft Windows up to Server 2019 Event Tracing use after free
1 hour 53 minutes ago
A vulnerability was found in Microsoft Windows up to Server 2019. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the component Event Tracing. Executing manipulation can lead to use after free.
This vulnerability is handled as CVE-2021-34486. The attack can be executed remotely. Additionally, an exploit exists.
A patch should be applied to remediate this issue.
vuldb.com
CVE-2021-43890 | Microsoft App Installer privilege escalation
1 hour 53 minutes ago
A vulnerability was found in Microsoft App Installer. It has been classified as critical. This impacts an unknown function. This manipulation causes privilege escalation.
This vulnerability appears as CVE-2021-43890. The attack may be initiated remotely. In addition, an exploit is available.
It is recommended to apply a patch to fix this issue.
vuldb.com