Aggregator
Webinar | Closing the "Clouds Gaps" Around the Shared Responsibility Model: Ensuring Your Data Can Weather Any Incident
3 months ago
Why CISOs Need to Own AI Enterprise Risk
3 months ago
Vigilance Cyber Security's Moriah Hara on AI Automation and Responsible AI
Mohira Hara, CISO and AI security, risk and governance consultant at Vigilance Cyber Security, says AI is reshaping financial services by accelerating anti-money laundering efforts, automating SOC functions and driving stronger governance frameworks that make CISOs central to managing AI risk.
Mohira Hara, CISO and AI security, risk and governance consultant at Vigilance Cyber Security, says AI is reshaping financial services by accelerating anti-money laundering efforts, automating SOC functions and driving stronger governance frameworks that make CISOs central to managing AI risk.
HSCC Guidance to Help Health Sector Navigate AI Cyber Risks
3 months ago
Documents Will Spotlight 5 Critical Risk Areas, Best Practices for Healthcare AI
The healthcare sector faces an array of complex cyber risk considerations involving artificial intelligence. The Health Sector Coordinating Council is rolling out a series of guidance documents to help these organizations navigate a long list of AI cybersecurity challenges.
The healthcare sector faces an array of complex cyber risk considerations involving artificial intelligence. The Health Sector Coordinating Council is rolling out a series of guidance documents to help these organizations navigate a long list of AI cybersecurity challenges.
Federal Shutdown Deal Revives Key CISA Grant, Some Staffing
3 months ago
CISA Pre-Shutdown Staffing Levels, State Grant Program to Be Restored Under Plan
A congressional funding bill would reverse shutdown-era layoffs at the Cybersecurity and Infrastructure Security Agency and restore the $1B State and Local Cybersecurity Grant Program, temporarily stabilizing the agency’s operations and buying Congress time for long-term reforms.
A congressional funding bill would reverse shutdown-era layoffs at the Cybersecurity and Infrastructure Security Agency and restore the $1B State and Local Cybersecurity Grant Program, temporarily stabilizing the agency’s operations and buying Congress time for long-term reforms.
UK Unveils Cyber Security and Resilience Bill
3 months ago
Legislation Proposes More Regulations for Greater Swath of the UK Economy
The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue.
The British government introduced Wednesday long-anticipated cybersecurity legislation aimed at tackling disruptive hacks targeting critical national infrastructure. Companies that run afoul of the new regulations could face daily fines that amount to 10% of their global revenue.
国家网络安全通报中心发布新一批重点防范境外恶意网址和恶意IP
3 months ago
相关恶意网址和恶意IP归属地主要涉及:美国、德国、荷兰、拉脱维亚、土耳其、伊朗、韩国、巴西。
NuGet平台现恶意包 暗藏破坏有效载荷
3 months ago
目前这些恶意扩展的具体攻击目标与来源尚不清楚,但建议可能受影响的机构立即核查资产是否安装了上述9款包,若存在则需默认已遭入侵并采取应对措施。
New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices
3 months ago
A new phishing campaign is targeting iPhone owners who have lost their devices, exploiting their hope of recovery to steal Apple ID credentials. The National Cyber Security Centre (NCSC) has received multiple reports of cases where victims received text messages claiming their lost or stolen iPhones had been found abroad, sometimes months after the devices […]
The post New Phishing Attack Targeting iPhone Owners Who’ve Lost Their Devices appeared first on Cyber Security News.
Tushar Subhra Dutta
CVE-2019-9766 | Free MP3 CD Ripper 2.6 File Converter MP3 File memory corruption (EDB-45403)
3 months ago
A vulnerability was found in Free MP3 CD Ripper 2.6. It has been classified as critical. This vulnerability affects unknown code of the component File Converter. The manipulation as part of MP3 File leads to memory corruption.
This vulnerability is uniquely identified as CVE-2019-9766. The attack is possible to be carried out remotely. Moreover, an exploit is present.
vuldb.com
CVE-2019-5722 | Portier 4.4.4.2/4.4.4.6 Login Form Parameter sql injection (Bug 151117 / EDB-46163)
3 months ago
A vulnerability labeled as critical has been found in Portier 4.4.4.2/4.4.4.6. This affects an unknown part of the component Login Form. Such manipulation as part of Parameter leads to sql injection.
This vulnerability is uniquely identified as CVE-2019-5722. The attack can be launched remotely. Moreover, an exploit is present.
vuldb.com
CVE-2019-10009 | South River Technologies Titan FTP Server 2019 Build 3505 /PreviewHandler.ashx path path traversal (EDB-46611)
3 months ago
A vulnerability was found in South River Technologies Titan FTP Server 2019 Build 3505. It has been rated as critical. The affected element is an unknown function of the file /PreviewHandler.ashx. Performing manipulation of the argument path with the input \..\..\..\..\Python27\README.txt results in path traversal.
This vulnerability is cataloged as CVE-2019-10009. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
Upgrading the affected component is advised.
vuldb.com
CVE-2019-8385 | Thomson Reuters Desktop Extensions 1.9.0.358 Service Port 6677 ThomsonReuters.Desktop.Service.exe path traversal (ID 152298 / EDB-46615)
3 months ago
A vulnerability was found in Thomson Reuters Desktop Extensions 1.9.0.358. It has been declared as critical. This affects an unknown function of the file ThomsonReuters.Desktop.Service.exe of the component Service Port 6677. Such manipulation leads to path traversal.
This vulnerability is referenced as CVE-2019-8385. It is possible to launch the attack remotely. Furthermore, an exploit is available.
vuldb.com
CVE-2019-14422 | TortoiseSVN 1.12.1 URI XLS File 7pk security (EDB-47252)
3 months ago
A vulnerability, which was classified as critical, was found in TortoiseSVN 1.12.1. Affected is an unknown function of the component URI Handler. Executing manipulation as part of XLS File can lead to 7pk security features.
This vulnerability appears as CVE-2019-14422. The attack may be performed from remote. In addition, an exploit is available.
vuldb.com
CVE-2019-2588 | Oracle BI Publisher 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 BI Publisher Security information disclosure (EDB-46728)
3 months ago
A vulnerability, which was classified as problematic, was found in Oracle BI Publisher 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0. This issue affects some unknown processing of the component BI Publisher Security. The manipulation results in information disclosure.
This vulnerability is reported as CVE-2019-2588. The attack can be launched remotely. Moreover, an exploit is present.
You should upgrade the affected component.
vuldb.com
CVE-2019-2616 | Oracle BI Publisher 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0 BI Publisher Security Local Privilege Escalation (EDB-46729)
3 months ago
A vulnerability classified as critical has been found in Oracle BI Publisher 11.1.1.9.0/12.2.1.3.0/12.2.1.4.0. This impacts an unknown function of the component BI Publisher Security. This manipulation causes Local Privilege Escalation.
This vulnerability is registered as CVE-2019-2616. Remote exploitation of the attack is possible. Furthermore, an exploit is available.
It is recommended to upgrade the affected component.
vuldb.com
CVE-2025-62199 | Microsoft Office use after free (Nessus ID 274837)
3 months ago
A vulnerability classified as critical was found in Microsoft Office. This affects an unknown part. Such manipulation leads to use after free.
This vulnerability is uniquely identified as CVE-2025-62199. The attack can be launched remotely. No exploit exists.
It is best practice to apply a patch to resolve this issue.
vuldb.com
CVE-2025-21480 | Qualcomm Snapdragon CCW up to WSA8845H authorization (EUVD-2025-16705 / Nessus ID 275164)
3 months ago
A vulnerability, which was classified as critical, was found in Qualcomm Snapdragon CCW, Snapdragon Compute, Snapdragon Industrial IOT and Snapdragon Mobile. Impacted is an unknown function. Executing manipulation can lead to incorrect authorization.
This vulnerability is tracked as CVE-2025-21480. The attack is restricted to local execution. Moreover, an exploit is present.
You should upgrade the affected component.
vuldb.com
CVE-2025-27038 | Qualcomm Snapdragon Connectivity up to WSA8835 Chrome use after free (EUVD-2025-16700 / Nessus ID 275164)
3 months ago
A vulnerability was found in Qualcomm Snapdragon Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music and Snapdragon Wearables. It has been rated as critical. Affected is an unknown function of the component Chrome. Performing manipulation results in use after free.
This vulnerability is reported as CVE-2025-27038. The attack is possible to be carried out remotely. Moreover, an exploit is present.
Upgrading the affected component is advised.
vuldb.com
CVE-2025-21479 | Qualcomm Snapdragon CCW up to WSA8845H GPU Micronode authorization (EUVD-2025-16710 / Nessus ID 275164)
3 months ago
A vulnerability labeled as critical has been found in Qualcomm Snapdragon CCW, Snapdragon Compute, Snapdragon Industrial IOT and Snapdragon Mobile. This affects an unknown part of the component GPU Micronode. The manipulation results in incorrect authorization.
This vulnerability is known as CVE-2025-21479. Attacking locally is a requirement. Furthermore, an exploit is available.
The affected component should be upgraded.
vuldb.com