Aggregator
CVE-2024-48138 | PluXml up to 5.8.16 Template parametres_edittpl.php injection (Issue 829)
CVE-2024-10487 | Google Chrome up to 130.0.6723.69 Dawn out-of-bounds write (ID 375123 / Nessus ID 209880)
CVE-2024-40799 | Apple iOS/iPadOS File out-of-bounds
CVE-2024-40799 | Apple macOS File out-of-bounds
CVE-2024-40799 | Apple watchOS File out-of-bounds
CVE-2024-40799 | Apple visionOS File out-of-bounds
CVE-2024-40799 | Apple tvOS File out-of-bounds
CVE-2024-40813 | Apple iOS/iPadOS Siri state issue
CVE-2024-40813 | Apple watchOS Siri state issue
CVE-2024-40832 | Apple macOS up to 14.5 Phone Number log file
CVE-2024-7208 | HostGator Hosted Services authentication spoofing
CVE-2024-41254 | litestream 0.3.13 Host Key Verification ssh.InsecureIgnoreHostKey channel accessible
CVE-2024-41519 | Feripro up to 2.2.3 veranstaltungen school cross site scripting
Risk hunting: A proactive approach to cyber threats
Cybersecurity is an overly reactive industry. Too often we act like firefighters, rushing from blaze to blaze, extinguishing flames hoping to keep the damage to a minimum, rather than fire suppression experts designing environments that refuse to burn. Just consider the litany of “detect and respond” technologies advanced by analysts and enthusiastically purchased by enterprises over the past decade. A recap: 2013 – Gartner coins the term Endpoint Detection and Response (EDR) 2016 – Managed … More →
The post Risk hunting: A proactive approach to cyber threats appeared first on Help Net Security.
Эффективное автовосстановление системы: миф или реальность?
CVE-2009-3407 | Oracle Application Server 10.1.2.3 (SBV-23847 / BID-36753)
International law enforcement operation dismantled RedLine and Meta infostealers
CVE-2015-0235 | Oracle Communications Policy Management 11.5 GlibC Ghost memory corruption (EDB-35951 / Nessus ID 82043)
Simplifying decentralized identity systems for everyday use
In this Help Net Security interview, Carla Roncato, VP of Identity at WatchGuard Technologies, discusses how companies can balance privacy, security, and usability in digital identity systems. She emphasizes modern techniques like biometrics and passkeys to replace knowledge-based authentication methods and highlights the need for global standardization in decentralized identity solutions. How can companies balance privacy, security and usability in digital identity systems—especially in sectors such as financial services and healthcare? One technique is to … More →
The post Simplifying decentralized identity systems for everyday use appeared first on Help Net Security.