Aggregator
The food supply chain has a cybersecurity problem
It’s unsettling to think that our food supply chain could be targeted or that the safety of our food could be compromised. But this is exactly the challenge the agri-food sector is dealing with right now. Despite agriculture’s importance, cybersecurity in this field doesn’t get the attention it deserves. Farms, processing plants, and distribution systems are going digital, and that’s opening the door to cyber attacks. A big problem is that a lot of the … More →
The post The food supply chain has a cybersecurity problem appeared first on Help Net Security.
JVN: 複数の富士電機製品における境界外書き込みの脆弱性
JVN: Johnson Controls製Software House iStar Pro Door Controllerにおける重要な機能に対する認証の欠如に関する脆弱性
CVE-2022-50065 | Linux Kernel up to 5.10.137/5.15.62/5.19.3 virtio_net xdp_convert_buff_to_frame memory leak (WID-SEC-2025-1350)
CVE-2022-50066 | Linux Kernel up to 5.10.137/5.15.62/5.19.3 net aq_nic.c aq_vec array index (Nessus ID 241601 / WID-SEC-2025-1350)
CVE-2022-50062 | Linux Kernel up to 5.4.210/5.10.137/5.15.62/5.19.3 dynamic_queue_limits.c netdev_sent_queue stack-based overflow (WID-SEC-2025-1350)
CVE-2022-50064 | Linux Kernel up to 5.19.3 virtblk_init_hctx use after free (WID-SEC-2025-1350)
CVE-2022-50060 | Linux Kernel up to 5.15.62/5.19.3 octeontx2-af allocation of resources (WID-SEC-2025-1350)
CVE-2022-50061 | Linux Kernel up to 5.19.3 pinctrl of_parse_phandle reference count (WID-SEC-2025-1350)
俄罗斯堪察加半岛发生 M8.8 级地震
俄罗斯堪察加半岛发生 M8.8 级地震
CVE-2017-6663 | Cisco IOS/IOS XE 16.3.1 Autonomic Networking Infrastructure access control (cisco-sa-20170726-anidos / EUVD-2017-15717)
CVE-2017-12238 | Cisco IOS 15.0/15.1/15.2/15.3/15.4 VPLS resource management (EUVD-2017-3811 / Nessus ID 103672)
CVE-2015-2291 | Intel Ethernet Diagnostics Driver up to 1.3.0 on Windows IQVW32.sys/IQVW64.sys IOCTL Call input validation (EDB-36392 / EUVD-2015-2389)
CVE-2015-4902 | Oracle Java SE 6u101/7u85/8u60 Deployment denial of service (EUVD-2015-4919 / Nessus ID 86731)
Как украсть всё через Telegram и не попасться: Raven Stealer показывает пример
CCS推出多款超低价洛杉矶/纽约独立服务器 采用至强CPU起售价129美元/年
Why CISOs should rethink identity risk through attack paths
Identity-based attack paths are behind most breaches today, yet many organizations can’t actually see how those paths form. The 2025 State of Attack Path Management report from SpecterOps makes the case that traditional tools like identity governance, PAM, and MFA aren’t enough. They help manage access, but they miss the bigger problem: how identity and privilege sprawl across the environment in ways that attackers can string together. Attack Path Management (APM) is a continuous security … More →
The post Why CISOs should rethink identity risk through attack paths appeared first on Help Net Security.