Aggregator
ChatGPT притворяется белкой: фестиваль глупости ИИ глазами Джанель Шейн
N. Korean Hackers Deploy New KLogEXE and FPSpy Malware in Targeted Attacks
Overloaded with SIEM Alerts? Discover Effective Strategies in This Expert-Led Webinar
Ваш ИИ – преступник, а вы – сообщник: новые правила Минюста США
The number of Android memory safety vulnerabilities has tumbled, and here’s why
Google’s decision to write new code into Android’s codebase in Rust, a memory-safe programming language, has resulted in a significant drop in memory safety vulnerabilities, despite old code (written in C/C++) not having been rewritten. The number of memory safety vulnerabilities found in the Android codebase per year (Source: Google) Android evolves, and has fewer memory safety vulnerabilities “The Android team began prioritizing transitioning new development to memory-safe languages around 2019. This decision was driven … More →
The post The number of Android memory safety vulnerabilities has tumbled, and here’s why appeared first on Help Net Security.
HPE Aruba Networking fixes critical flaws impacting Access Points
Black Suit
X 发布首份透明度报告
CVE-2007-3883 | Datadynamics ActiveBar 3.1 ActiveX Control actbar3.ocx first Remote Code Execution (EDB-4190 / Nessus ID 54841)
黑客声称窃取了 8700 万条数据记录后,Temu 否认存在违规行为
WordPress vs WP Engine: корпоративная битва сделала уязвимыми 40% сайтов в интернете
Cisco Releases Security Updates for IOS and IOS XE Software
Cisco released its September 2024 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication to address vulnerabilities in IOS and IOS XE. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system.
CISA encourages users and administrators to review the following and apply the necessary updates:
CISA Releases Five Industrial Control Systems Advisories
CISA released five Industrial Control Systems (ICS) advisories on September 26, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-270-01 Advantech ADAM-5550
- ICSA-24-270-02 Advantech ADAM-5630
- ICSA-24-270-03 Atelmo Atemio AM 520 HD Full HD Satellite Receiver
- ICSA-24-270-04 goTenna Pro X and Pro X2
- ICSA-24-270-05 goTenna Pro ATAK Plugin
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
ASD’s ACSC, CISA, and US and International Partners Release Guidance on Detecting and Mitigating Active Directory Compromises
Today, the Australian Signals Directorate Australian Cyber Security Centre (ASD ACSC), the Cybersecurity and Infrastructure Security Agency (CISA), and other U.S. and international partners released the joint guide Detecting and Mitigating Active Directory Compromises. This guide informs organizations of recommended strategies to mitigate common techniques used by malicious actors to compromise Active Directory.
Active Directory is the most widely used authentication and authorization solution in enterprise information technology (IT) networks globally. Malicious actors routinely target Active Directory as part of efforts to compromise enterprise IT networks by escalating privileges and targeting the highest confidential user objects.
Responding to and recovering from malicious activity involving Active Directory can be consuming, costly, and disruptive. CISA encourages organizations review the guidance and implement the recommended mitigations to improve Active Directory security.
To learn more about taking a top-down approach to developing secure products, visit CISA’s Secure by Design webpage.