Aggregator
CVE-2024-6446 | GitLab up to 17.1.6/17.2.4/17.3.1 URL logic error (Issue 470144)
CVE-2024-5435 | GitLab Enterprise Edition up to 17.1.6/17.2.4/17.3.1 Repository Mirror information exposure (Issue 464044)
CVE-2024-4612 | GitLab Enterprise Edition up to 17.1.6/17.2.4/17.3.1 redirect (Issue 460707)
CVE-2024-2743 | GitLab up to 17.1.6/17.2.4/17.3.1 authorization (Issue 451014)
CVE-2024-8124 | GitLab Community Edition/Enterprise Edition up to 17.1.6/17.2.4/17.3.1 glm_source redos (Issue 480533)
CVE-2024-6389 | GitLab Community Edition/Enterprise Edition up to 17.1.6/17.2.4/17.3.1 Atom Endpoint exposure of sensitive system information to an unauthorized control sphere (Issue 469367)
CVE-2024-4660 | GitLab Enterprise Edition up to 17.1.6/17.2.4/17.3.1 Private Project authorization (Issue 460892)
Proofpoint Adds Ability to Dynamically Apply Granular Security Controls
Proofpoint this week at its Protect conference launched a series of efforts through which it plans to provide cybersecurity teams with more granular controls in real-time, over what applications and services are accessed by end users.
The post Proofpoint Adds Ability to Dynamically Apply Granular Security Controls appeared first on Security Boulevard.
OpenAI o1: мысли как человек, решай как машина
Тайная жизнь вашего смартфона: как безобидные программы превращаются в шпионов
Standing on the Windows platform, waiting for change
Randall Munroe’s XKCD ‘Water Filtration’
via the comic & dry wit of Randall Munroe, creator of XKCD
The post Randall Munroe’s XKCD ‘Water Filtration’ appeared first on Security Boulevard.
Defensive Stack Optimization: A Threat-Informed Defense Use Case
In this blog series, we dive into the challenges faced by our heroes of Threat-Informed Defense, how they address them, and the benefits they are driving for their team and organization.
The post Defensive Stack Optimization: A Threat-Informed Defense Use Case appeared first on Security Boulevard.
UK arrests teen linked to Transport for London cyber attack
威努特全面亮相CCS2024成都网络安全系列活动!
A proactive defense: Utilize SBOMs and continuous monitoring
Navigating the complexities of software supply chain security demands proactive measures to identify and manage vulnerabilities and compliance issues effectively.
The post A proactive defense: Utilize SBOMs and continuous monitoring appeared first on Security Boulevard.