Aggregator
CVE-2015-5890 | Apple Mac OS X up to 10.10 IOGraphics memory corruption (ID 370192 / SBV-53172)
CVE-2015-5871 | Apple Mac OS X up to 10.10 IOGraphics memory corruption (ID 370192 / SBV-53167)
CVE-2015-5872 | Apple Mac OS X up to 10.10 IOGraphics memory corruption (ID 370192 / SBV-53169)
CVE-2015-5873 | Apple Mac OS X up to 10.10 IOGraphics memory corruption (ID 370192 / SBV-53171)
苹果官方警告:零日漏洞攻击瞄准 Mac 电脑用户
CVE-2024-11088 | mra13 Simple Membership Plugin up to 4.5.5 on WordPress information disclosure
CVE-2024-11089 | cayenne Anonymous Restricted Content Plugin up to 1.6.5 on WordPress information disclosure
CVE-2015-3315 | Automatic Bug Reporting Tool /var/tmp/abrt/*/maps link following (RHSA-2015:1083 / EDB-44097)
US DoJ charges five alleged members of the Scattered Spider cybercrime gang
美国大型医疗支付网络在遭受勒索软件攻击 9 个月后恢复系统
Active network of North Korean IT front companies exposed
An analysis of the websites belonging to companies that served as a front for getting North Korean IT workers remote jobs with businesses worldwide has revealed an active network of such companies originating in China. Unearthing North Korean IT front companies US authorities have been warning about North Korean IT workers’ tactics to bypass sanctions for a number of years, and have repeatedly seized website domains that looked like they belong to legitimate IT services … More →
The post Active network of North Korean IT front companies exposed appeared first on Help Net Security.
BianLian
Is fixed wireless access the new frontier for threats to the mobile network?
CVE-2024-53426 | ntopng 6.2 Flow::dissectMDNS heap-based overflow
CVE-2024-7130 | Kion Computer KION Exchange Programs Software up to 21.11.2024 cross site scripting
CVE-2024-7026 | Teknogis Informatics Closed Circuit Vehicle Tracking Software up to 21.11.2024 sql injection
CVE-2024-53425 | Assimp 5.4.3 SkipSpacesAndLineEnd heap-based overflow
BianLian Ransomware Group Adopts New Tactics, Posing Significant Risk
Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC)
Operational Technology (OT) and Industrial Control Systems (ICS) are critical components of many industries, especially those within the 16 critical […]
The post Building and Enhancing OT/ICS Security Programs Through Governance, Risk, and Compliance (GRC) appeared first on Security Boulevard.