Aggregator
CVE-2015-0565 | DRAM PTE Rowhammer privileges management (EDB-36310 / XFDB-101427)
1 year 4 months ago
A vulnerability, which was classified as very critical, has been found in DRAM. Affected by this issue is some unknown functionality of the component PTE Handler. The manipulation leads to improper privilege management (Rowhammer).
This vulnerability is handled as CVE-2015-0565. The attack may be launched remotely. Furthermore, there is an exploit available. This vulnerability has a historic impact due to its background and reception.
It is recommended to apply the suggested workaround.
vuldb.com
Onapsis Expands Code Security Capabilities to Accelerate and De-Risk SAP BTP Development Projects
1 year 4 months ago
CVE-2024-11674 | CodeAstro Hospital Management System 1.0 his_doc_update-account.php doc_dpic unrestricted upload
1 year 4 months ago
A vulnerability, which was classified as critical, was found in CodeAstro Hospital Management System 1.0. Affected is an unknown function of the file /backend/doc/his_doc_update-account.php. The manipulation of the argument doc_dpic leads to unrestricted upload.
This vulnerability is traded as CVE-2024-11674. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
CVE-2024-11703 | Mozilla Firefox up to 132 on Android improper authentication (Nessus ID 211873)
1 year 4 months ago
A vulnerability classified as problematic has been found in Mozilla Firefox up to 132 on Android. Affected is an unknown function. The manipulation leads to improper authentication.
This vulnerability is traded as CVE-2024-11703. It is possible to launch the attack on the physical device. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
Ransomware-hit vodka maker Stoli files for bankruptcy in the United States
1 year 4 months ago
Ransomware-hit vodka maker Stoli files for bankruptcy in the United States
Wyden and Schmitt Call for Investigation of Pentagon's Phone Systems
1 year 4 months ago
Vulnerabilities in ICS: A Detailed Analysis of Recent Security Advisories and Threats
1 year 4 months ago
Vulnerabilities in ICS: A Detailed Analysis of Recent Security Advisories and Threats
Australia’s ACSC and ASD Team Up with CISA, NSA, FBI, and International Allies to Protect Communications Infrastructure
1 year 4 months ago
Australia’s ACSC and ASD Team Up with CISA, NSA, FBI, and International Allies to Protect Communications Infrastructure
Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says
1 year 4 months ago
Chinese-Made LiDAR Systems a National Security Risk, Think Tank Says
U.S. Offered $10M for Hacker Just Arrested by Russia
1 year 4 months ago
U.S. Offered $10M for Hacker Just Arrested by Russia
CISA Issues Guidance to Telecom Sector on Salt Typhoon Threat
1 year 4 months ago
Individuals concerned about the privacy of their communications should consider using encrypted messaging apps and encrypted voice communications, CISA and FBI officials say.
Jai Vijayan, Contributing Writer
AI in Cybersecurity: Insights from Palo Alto Networks Unit 42®
1 year 4 months ago
AI is reshaping the fight against digital threats. Learn how attackers are using AI to supercharge malware and social engineering—and how organizations can harness it to predict, detect, and stop cyberattacks in their tracks.
World Wide Work: Landing a Cybersecurity Career Overseas
1 year 4 months ago
Tips for Finding and Getting Security Jobs in a Global Market
Organizations ranging from multinational corporations to government agencies and international nonprofits require cybersecurity expertise. These roles often include exciting opportunities for travel or relocation, making them an attractive path for professionals ready to take their careers global.
Organizations ranging from multinational corporations to government agencies and international nonprofits require cybersecurity expertise. These roles often include exciting opportunities for travel or relocation, making them an attractive path for professionals ready to take their careers global.
How Hackers Can Manipulate AI to Affect Health App Accuracy
1 year 4 months ago
Hackers can potentially use AI to manipulate data that's generated and shared by some health apps, diminishing the data's accuracy and integrity, said Sina Yazdanmehr and Lucian Ciobotaru of cybersecurity firm Aplite, describing a recent research project involving Google Health Connect.
OnDemand | How to Build Cyber Resilience with Proactive Incident Response Strategies
1 year 4 months ago
Regulator Accuses AI Video Firm of Deceptive Marketing
1 year 4 months ago
IntelliVision Settles With Federal Trade Commission Over Facial Recognition Claims
Facial recognition software maker IntelliVision has reached a settlement with the U.S. Federal Trade Commission after the regulator accused the AI-powered software vendor of deceptive marketing claims, including that its tools have "zero gender or racial bias" and market-leading levels of accuracy.
Facial recognition software maker IntelliVision has reached a settlement with the U.S. Federal Trade Commission after the regulator accused the AI-powered software vendor of deceptive marketing claims, including that its tools have "zero gender or racial bias" and market-leading levels of accuracy.
Bug Bounties: Bringing Hackers and Manufacturers Together
1 year 4 months ago
Researcher Lennert Wouters on Benefits of Device Hacking Contests, Collaboration
Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
Lennert Wouters, a researcher at KU Leuven University in Belgium, has spent the past eight years studying embedded security, analyzing the vulnerabilities of everyday devices and commercial products. He shares his greatest hacks and insights on hardware security industry trends.
Police Shutter Largest German-Speaking Criminal Marketplace
1 year 4 months ago
Crimenetwork Served as a Platform for Illegal Goods and Services
German police arrested the suspected administrator of the largest German-speaking underground markets for illegal goods and services. Crimenetwork, online since 2012, was used to sell stolen data, drugs and forged documents. The platform had more than 100,000 users and 100 sellers.
German police arrested the suspected administrator of the largest German-speaking underground markets for illegal goods and services. Crimenetwork, online since 2012, was used to sell stolen data, drugs and forged documents. The platform had more than 100,000 users and 100 sellers.
US FTC Cracks Down Geolocation Data Brokers
1 year 4 months ago
Gravy Analytics and Mobilewalla Ordered to Implement Stronger Consent Measures
Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.
Two data brokers pledged to stop using geolocation data gleaned from smartphones to sell services that provide a window to the intimate lives of Americans. "Surreptitious surveillance by data brokers undermines our civil liberties," an U.S. Federal Trade Commission official said.