Aggregator
The Perils of Ignoring Cybersecurity Basics
法官批准FTX 加密货币交易所破产计划,客户将很快拿回资金
Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars
Recent discoveries in the automotive cybersecurity landscape have unveiled a series of critical zero-day vulnerabilities that could allow attackers to gain full control over vehicle systems. These vulnerabilities, highlighted in a presentation by security researcher Amit Geynis of PlaxidityX, underscore the urgent need for robust cybersecurity measures in the automotive industry. Series of Vulnerabilities The […]
The post Critical Automative 0-Day Flaws Let Attackers Gain Full Control Over Cars appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
CVE-2024-42285 | Linux Kernel up to 6.1.102/6.6.43/6.10.2 iw_conn_req_handler use after free (Nessus ID 208245)
CVE-2024-42276 | Linux Kernel up to 6.1.102/6.6.43/6.10.2 nvme-pci nvme_map_data null pointer dereference (Nessus ID 208245)
CVE-2024-42272 | Linux Kernel up to 6.1.103/6.6.44/6.10.3 rhashtable.h rhashtable_lookup initialization (Nessus ID 208245)
CVE-2024-38577 | Linux Kernel up to 6.1.92/6.6.32/6.8.11/6.9.2 rcu-tasks show_rcu_tasks_trace_gp_kthread buffer overflow (Nessus ID 208245)
CVE-2024-42259 | Linux Kernel up to 6.6.45/6.10.4 i915 memory corruption (4b09513ce93b/ead9289a51ea/8bdd9ef7e9b1 / Nessus ID 208245)
CVE-2024-41011 | Linux Kernel up to 6.1.90/6.6.30/6.8.9 amdkfd calculation (Nessus ID 208245)
CVE-2021-3669 | Linux Kernel Shared Memory Page resource consumption (Nessus ID 208245)
CVE-2024-9114 | FastStone Image Viewer GIF File Parser out-of-bounds write (ZDI-24-1275 / Nessus ID 208256)
CVE-2021-26236 | FastStone Image Viewer up to 7.5 CUR File BitCount buffer overflow (EDB-49660 / Nessus ID 208258)
CVE-2021-26237 | FastStone Image Viewer up to 7.5 CUR File FSViewer.exe memory corruption (Nessus ID 208258)
Likho Hackers Using MeshCentral For Remotely Managing Victim Systems
The Awaken Likho APT group launched a new campaign in June of 2024 with the intention of targeting Russian government agencies and businesses by targeting them. The group has abandoned its previous use of the UltraVNC module for remote access and adopted the MeshCentral agent instead, which highlights its adaptability and continuous efforts to evade […]
The post Likho Hackers Using MeshCentral For Remotely Managing Victim Systems appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.