Aggregator
CISA Releases One Industrial Control Systems Advisory
CISA released one Industrial Control Systems (ICS) advisory on September 3, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS.
- ICSA-24-247-01 LOYTEC Electronics LINX Series
CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations.
CISA Adds Three Known Exploited Vulnerabilities to Catalog
CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2021-20123 Draytek VigorConnect Path Traversal Vulnerability
- CVE-2021-20124 Draytek VigorConnect Path Traversal Vulnerability
- CVE-2024-7262 Kingsoft WPS Office Path Traversal Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.
«Годзилла» в тени: невидимый ящер проникает в сердце Atlassian
钓鱼特辑(四)安全较量,摆脱“麻瓜”标签
FreeBuf早报 | 伊朗APT组织攻击卫星设备;系统被黑导致安防公司被罚2000万
4 способа эксплуатации CVE-2024-20017: как всего одна уязвимость может разрушить вашу сеть
ФСТЭК против GPTBot: госорганам поручено закрыть доступ зарубежным ботам
ИИ против человечества: новая система спасет нас от засилья ботов
Camu и теневая экономика: как пиратский контент обналичивается через рекламу
如何在人工智能时代识别网络钓鱼?
渠道精英训练营——技术大比武荣誉榜
入选领域最多、影响力最广泛!360上榜《2024网络安全十大创新方向》
Identifying Common Open Port Vulnerabilities in Your Network
When intruders want to break into an establishment, they look for an opening. An open port is one of the openings that a hacker or threat actor looks for to access a digital network. That open port may be on a firewall, a server, or any network-connected computing device. Just as a single unlocked door … Continued
Verkada Pay $2.95 Million Failed To Secure Data Lead To Massive Breach
The FTC has ordered Verkada to implement a comprehensive information security program to address its lax security practices that allowed a hacker to compromise customer security cameras. Verkada will pay a $2.95 million fine for violating the CAN-SPAM Act by sending unsolicited commercial emails to prospective customers. The proposed order, which requires court approval, mandates […]
The post Verkada Pay $2.95 Million Failed To Secure Data Lead To Massive Breach appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.