Aggregator
CVE-2023-44431 | BlueZ Audio Profile AVRCP stack-based overflow (ZDI-23-1900 / Nessus ID 210817)
CVE-2023-51594 | BlueZ OBEX Library out-of-bounds (ZDI-23-1901 / Nessus ID 210817)
CVE-2023-51589 | BlueZ Audio Profile AVRCP parse_media_element out-of-bounds (ZDI-23-1904 / Nessus ID 210817)
CVE-2023-51592 | BlueZ Audio Profile AVRCP parse_media_folder out-of-bounds (ZDI-23-1905 / Nessus ID 210817)
CVE-2023-51596 | BlueZ Phone Book Access Profile heap-based overflow (ZDI-23-1902 / Nessus ID 210817)
New Flaws in Citrix Virtual Apps Enable RCE Attacks via MSMQ Misconfiguration
New Phishing Tool GoIssue Targets GitHub Developers in Bulk Email Campaigns
Protecting Critical Infrastructure: A Collaborative Approach to Security for ICS, OT, and IIoT
Microsoft Patch Tuesday, November 2024 Edition
Patch Tuesday Update – November 2024
The post Patch Tuesday Update - November 2024 appeared first on Digital Defense.
The post Patch Tuesday Update – November 2024 appeared first on Security Boulevard.
Insurance Firm Introduces Liability Coverage for CISOs
Microsoft Exchange adds warning to emails abusing spoofing flaw
HPE security advisory (AV24-647)
6 Ways to Save Money on CMMC Costs
The DoD’s CMMC Final Rule becomes effective on December 16, 2024, and requires organizations who handle CUI to achieve CMMC Level 2 Certification, which will require an independent assessment every 3 years by a C3PAO (CMMC Third Party Assessment Organization). The DoD estimates the cost of these assessments will exceed $100,000, plus the cost of […]
The post 6 Ways to Save Money on CMMC Costs appeared first on PreVeil.
The post 6 Ways to Save Money on CMMC Costs appeared first on Security Boulevard.
[Control systems] Schneider Electric security advisory (AV24-646)
SAP security advisory – November 2024 monthly rollup (AV24-645)
A Threat Actor Has Allegedly Leaked Data of Statistisches Bundesamt
Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039)
November 2024 Patch Tuesday is here, and Microsoft has dropped fixes for 89 new security issues in its various products, two of which – CVE-2024-43451 and CVE-2024-49039 – are actively exploited by attackers. The exploited vulnerabilities (CVE-2024-43451, CVE-2024-49039) CVE-2024-43451 is yet another vulnerability that allows attackers to elevate their privileges on targeted Windows and Windows Server machines by disclosing the user’s NTLMv2 hash, which contains their authentication credentials. The hash can then be used by … More →
The post Microsoft fixes actively exploited zero-days (CVE-2024-43451, CVE-2024-49039) appeared first on Help Net Security.