Aggregator
CVE-2024-52316 | Apache Tomcat up to 9.0.95/10.1.30/11.0.0-M26 ServerAuthContext Component error condition (Nessus ID 211506)
APT73
DataCon2024 | 赛程过半,五大赛道最新排名公布
Microsoft 365 Admin portal abused to send sextortion emails
Unlocking Cybersecurity Talent: The Power of Apprenticeships
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2024-1212 Progress Kemp LoadMaster OS Command Injection Vulnerability
- CVE-2024-0012 Palo Alto Networks PAN-OS Management Interface Authentication Bypass Vulnerability
- CVE-2024-9474 Palo Alto Networks PAN-OS Management Interface OS Command Injection Vulnerability
Users and administrators are also encouraged to review the Palo Alto Threat Brief: Operation Lunar Peek related to CVE-2024-0012, the Palo Alto Security Bulletin for CVE-2024-0012, and the Palo Alto Security Bulletin for CVE-2024-9474 for additional information.
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
Melissa Midzor Named Director of NIST’s Communications Technology Laboratory
Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage
With Scytale's new partnership program, MSPs can seamlessly scale compliance offerings to their clients and increase efficiency.
The post Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage appeared first on Scytale.
The post Scytale Launches New Partnership Program with Managed Service Providers (MSPs), Helping Transform Compliance into a Competitive Advantage appeared first on Security Boulevard.
«Ленин» в мире IT: взлет и падение создателя крупнейшей кардинг-империи
THN Recap: Top Cybersecurity Threats, Tools, and Practices (Nov 11 - Nov 17)
Glove Stealer 恶意软件绕过 Chrome 加密,窃取敏感数据
North Korean IT Worker Network Tied to BeaverTail Phishing Campaign
18th November – Threat Intelligence Report
For the latest discoveries in cyber research for the week of 11th November, please download our Threat Intelligence Bulletin. TOP ATTACKS AND BREACHES The FBI and CISA issued a joint statement detailing a major Chinese cyber-espionage campaign targeting U.S. telecommunications infrastructure, led by the APT group Salt Typhoon. This operation compromised networks to steal call […]
The post 18th November – Threat Intelligence Report appeared first on Check Point Research.