ESET Research details the tools and activities of a new China-aligned threat actor, CeranaKeeper, focusing on massive data exfiltration in Southeast Asia
We’re pleased to announce that the litigation against Sable has finally concluded on terms that we believe send a strong message to patent trolls everywhere — if you bring meritless patent claims against Cloudflare, we will fight back and we will win.
Over the past couple of weeks, Cloudflare's DDoS protection systems have automatically and successfully mitigated multiple hyper-volumetric L3/4 DDoS attacks exceeding 3 billion packets per second (Bpps). Our systems also automatically mitigated multiple attacks exceeding 3 terabits per second (Tbps), with the largest ones exceeding 3.65 Tbps. The scale of these attacks is unprecedented.
DrayTek has released security updates for multiple router models to address 14 vulnerabilities of varying severity, including a remote code execution flaw that received the maximum CVSS score of 10. [...]
A little over a dozen new security vulnerabilities have been discovered in residential and enterprise routers manufactured by DrayTek that could be exploited to take over susceptible devices.
"These vulnerabilities could enable attackers to take control of a router by injecting malicious code, allowing them to persist on the device and use it as a gateway into enterprise networks," Forescout
A vulnerability, which was classified as critical, was found in phpBG. Affected is an unknown function of the file intern/clan/member_add.php. The manipulation of the argument rootdir leads to improper input validation.
This vulnerability is traded as CVE-2007-4636. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability has been found in Sophos Intercept X on Windows and classified as problematic. This vulnerability affects unknown code of the component Device Encryption. The manipulation leads to use of unmaintained third party components.
This vulnerability was named CVE-2024-8885. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Schneider Elektronik Series 700 up to 0.1.17.6. This affects an unknown part. The manipulation leads to missing authentication.
This vulnerability is uniquely identified as CVE-2024-35293. It is possible to initiate the attack remotely. There is no exploit available.
A vulnerability, which was classified as problematic, has been found in Schneider Elektronik Series 700 up to 0.1.17.6. Affected by this issue is some unknown functionality. The manipulation leads to missing authentication.
This vulnerability is handled as CVE-2024-35294. The attack may be launched remotely. There is no exploit available.
A vulnerability classified as problematic was found in Canonical Juju up to 2.9.50/3.1.9/3.3.6/3.4.5/3.5.3. Affected by this vulnerability is an unknown functionality of the component Unix Domain Socket Handler. The manipulation leads to unprotected alternate channel.
This vulnerability is known as CVE-2024-8038. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic has been found in Canonical Juju up to 2.9.50/3.1.9/3.3.6/3.4.5/3.5.3. Affected is an unknown function of the file /var/lib/Juju/agents/unit-xxxx-yyyy/agent.socket of the component Unix Domain Socket Handler. The manipulation leads to Local Privilege Escalation.
This vulnerability is traded as CVE-2024-8037. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
A vulnerability was found in Canonical Juju up to 2.9.50/3.1.9/3.3.6/3.4.5/3.5.3. It has been rated as problematic. This issue affects some unknown processing. The manipulation of the argument JUJU_CONTEXT_ID leads to use of weak credentials.
The identification of this vulnerability is CVE-2024-7558. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.