Aggregator
How Microsoft Is Beefing Up Security With 34,000 Engineers
1 year 6 months ago
After Review Board Criticism, Microsoft Targets Culture, Governance, Engineering
After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.
After high-profile security incidents, Microsoft has dedicated 34,000 engineers to advancing security across all platforms, focusing on identity protection and rapid response. The company is embedding security into product development and governance frameworks to mitigate growing cyberthreats.
Fake Paystubs Are Draining Billions From Lenders
1 year 6 months ago
How AI Could Solve Failings of Traditional Employment and Income Verification
Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.
Fake paystub generators and unscrupulous businesses have made it easy for fraudsters to exploit outdated employment and income verification systems that account for $3.6 billion in losses for auto lenders alone, but AI-driven solutions are emerging as a game-changing defense.
US Pushes Ban on Chinese, Russian Tech in Connected Vehicles
1 year 6 months ago
Commerce Department Moves to Regulate Foreign Vehicle Tech Amid Security Fears
The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.
The White House is proposing new regulations on connected vehicles that would prohibit manufacturers from importing software or hardware from the People's Republic of China and Russia, citing an ever-increasing threat landscape and heightened national security risks.
North Korea Targets Software Supply Chain Via PyPI
1 year 6 months ago
Backdoored Python Packages Likely Work of 'Gleaming Pisces,' Says Palo Alto
A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.
A North Korean hacking group with a history of a stealing cryptocurrency is likely behind a raft of poisoned Python packages targeting developers working on the Linux and macOS operating systems in an apparent attempt at a supply chain attack.
CVE-2007-3524 | Ripe Website Manager up to 0.8.9 author_panel_header.php level file inclusion (EDB-4129 / XFDB-35188)
1 year 6 months ago
A vulnerability classified as critical has been found in Ripe Website Manager up to 0.8.9. Affected is an unknown function of the file admin/includes/author_panel_header.php. The manipulation of the argument level leads to file inclusion.
This vulnerability is traded as CVE-2007-3524. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
vuldb.com
RansomHub
1 year 6 months ago
cohenido
North Korea-linked APT Gleaming Pisces deliver new PondRAT backdoor via malicious Python packages
1 year 6 months ago
IBM security advisory (AV24-538)
1 year 6 months ago
Canadian Centre for Cyber Security
CVE-2023-21855 | Oracle Sales for Handhelds up to 12.2.12 Pocket Outlook Sync(PocketPC)
1 year 6 months ago
A vulnerability was found in Oracle Sales for Handhelds up to 12.2.12 and classified as critical. This issue affects some unknown processing of the component Pocket Outlook Sync(PocketPC). The manipulation leads to an unknown weakness.
The identification of this vulnerability is CVE-2023-21855. The attack may be initiated remotely. There is no exploit available.
vuldb.com
CVE-2023-3664 | FileOrganizer Plugin up to 1.0.2 on WordPress access control
1 year 6 months ago
A vulnerability, which was classified as problematic, was found in FileOrganizer Plugin up to 1.0.2 on WordPress. This affects an unknown part. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2023-3664. Access to the local network is required for this attack. There is no exploit available.
vuldb.com
CVE-2023-43226 | DedeCMS up to 5.7.111 dede/baidunews.php unrestricted upload (Replaces VDB-240948)
1 year 6 months ago
A vulnerability was found in DedeCMS up to 5.7.111. It has been rated as problematic. Affected by this issue is some unknown functionality of the file dede/baidunews.php. The manipulation leads to unrestricted upload.
This vulnerability is handled as CVE-2023-43226. The attack can only be initiated within the local network. There is no exploit available.
vuldb.com
CVE-2024-0582 | Linux Kernel io_uring Subsystem use after free
1 year 6 months ago
A vulnerability, which was classified as critical, has been found in Linux Kernel. This issue affects some unknown processing of the component io_uring Subsystem. The manipulation leads to use after free.
The identification of this vulnerability is CVE-2024-0582. Access to the local network is required for this attack to succeed. There is no exploit available.
It is recommended to apply a patch to fix this issue.
vuldb.com
CVE-2024-5225 | berriai litellm api_key sql injection
1 year 6 months ago
A vulnerability classified as critical was found in berriai litellm. This vulnerability affects unknown code. The manipulation of the argument api_key leads to sql injection.
This vulnerability was named CVE-2024-5225. The attack can be initiated remotely. There is no exploit available.
vuldb.com
CVE-2024-27795 | Apple macOS up to 14.7 Camera Extension permission
1 year 6 months ago
A vulnerability, which was classified as critical, has been found in Apple macOS. Affected by this issue is some unknown functionality of the component Camera Extension Handler. The manipulation leads to permission issues.
This vulnerability is handled as CVE-2024-27795. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-23237 | Apple macOS up to 14.7 denial of service
1 year 6 months ago
A vulnerability was found in Apple macOS. It has been declared as critical. This vulnerability affects unknown code. The manipulation leads to denial of service.
This vulnerability was named CVE-2024-23237. An attack has to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-27860 | Apple macOS up to 14.7 memory corruption
1 year 6 months ago
A vulnerability, which was classified as problematic, was found in Apple macOS. This affects an unknown part. The manipulation leads to memory corruption.
This vulnerability is uniquely identified as CVE-2024-27860. Attacking locally is a requirement. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-27861 | Apple macOS up to 14.7 memory corruption
1 year 6 months ago
A vulnerability has been found in Apple macOS and classified as problematic. This vulnerability affects unknown code. The manipulation leads to memory corruption.
This vulnerability was named CVE-2024-27861. It is possible to launch the attack on the local host. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-27858 | Apple macOS up to 14.7 permission
1 year 6 months ago
A vulnerability was found in Apple macOS. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to permission issues.
The identification of this vulnerability is CVE-2024-27858. Local access is required to approach this attack. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2024-40826 | Apple macOS Print View temp file
1 year 6 months ago
A vulnerability has been found in Apple macOS and classified as problematic. This vulnerability affects unknown code of the component Print View. The manipulation leads to insecure temporary file.
This vulnerability was named CVE-2024-40826. The attack needs to be approached locally. There is no exploit available.
It is recommended to upgrade the affected component.
vuldb.com