Advertisements


SSVC: Prioritization of vulnerability remediation according to CISA

Given that 2021 was a record year for new vulnerabilities published and threat actors became better at weaponizing vulnerabilities, timely and well-judged vulnerability prioritization and remediation are a goal all organizations should aspire to achi.....»»

Category: securitySource:  netsecurityNov 15th, 2022

Week in review: Palo Alto Networks firewalls under attack, Microsoft patches two exploited zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400) Attackers are exploiting a command injection vulnerability (CVE-2024-3.....»»

Category: securitySource:  netsecurityRelated NewsApr 14th, 2024

CVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks

Earlier today, Palo Alto Networks revealed that a critical command injection vulnerability (CVE-2024-3400) in the company’s firewalls has been exploited in limited attacks and has urged customers with vulnerable devices to quickly implement mit.....»»

Category: securitySource:  netsecurityRelated NewsApr 12th, 2024

Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)

Attackers are exploiting a command injection vulnerability (CVE-2024-3400) affecting Palo Alto Networks’ firewalls, the company has warned, and urged customers to implement temporary mitigations and get in touch to check whether their devices have.....»»

Category: securitySource:  netsecurityRelated NewsApr 12th, 2024

Hackable Intel and Lenovo hardware that went undetected for 5 years won’t ever be fixed

Multiple links in the supply chain failed for years to identify an unfixed vulnerability. Enlarge (credit: Intel) Hardware sold for years by the likes of Intel and Lenovo contains a remotely exploitable vulnerability tha.....»»

Category: topSource:  arstechnicaRelated NewsApr 11th, 2024

CISA warns about Sisense data breach

Business intelligence / data analytics software vendor Sisense has apparently suffered a data breach that spurred the company and the US Cybersecurity and Infrastructure Security Agency to push the company’s customers to “reset credential.....»»

Category: securitySource:  netsecurityRelated NewsApr 11th, 2024

Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»

Category: SSSSSSource:  netsecurityRelated NewsApr 11th, 2024

Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»

Category: SSSSSSource:  netsecurityRelated NewsApr 11th, 2024

Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»

Category: SSSSSSource:  netsecurityRelated NewsApr 11th, 2024

Microsoft patches two actively exploited zero-days (CVE-2024-29988, CVE-2024-26234)

On this April 2024 Patch Tuesday, Microsoft has fixed a record 147 CVE-numbered vulnerabilities, including CVE-2024-29988, a vulnerability that Microsoft hasn’t marked as exploited, but Peter Girnus, senior threat researcher with Trend Micro.....»»

Category: SSSSSSource:  netsecurityRelated NewsApr 11th, 2024

92,000+ internet-facing D-Link NAS devices accessible via “backdoor” account (CVE-2024-3273)

A vulnerability (CVE-2024-3273) in four old D-Link NAS models could be exploited to compromise internet-facing devices, a threat researcher has found. The existence of the flaw was confirmed by D-Link last week, and an exploit for opening an interact.....»»

Category: securitySource:  netsecurityRelated NewsApr 8th, 2024

NVD: NIST is working on longer-term solutions

The recent conspicuous faltering of the National Vulnerability Database (NVD) is “based on a variety of factors, including an increase in software and, therefore, vulnerabilities, as well as a change in interagency support,” says the U.S......»»

Category: securitySource:  netsecurityRelated NewsApr 3rd, 2024

A chemically bonded photocatalyst with rich oxygen vacancies for improved photocatalytic decontamination

A challenge in promoting the industrial application of photocatalysis technology for environment remediation lies in the design of high-performance photocatalysts. These photocatalysts should be endowed with efficient photo-carrier separation and int.....»»

Category: topSource:  physorgRelated NewsApr 1st, 2024

Week in review: Backdoor found in XZ utilities, weaponized iMessages, Exchange servers at risk

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094) A vulnerability (CVE-2024-3094) in XZ Utils, the XZ format compres.....»»

Category: securitySource:  netsecurityRelated NewsMar 31st, 2024

Beware! Backdoor found in XZ utilities used by many Linux distros (CVE-2024-3094)

A vulnerability (CVE-2024-3094) in XZ Utils, the XZ format compression utilities included in most Linux distributions, may “enable a malicious actor to break sshd authentication and gain unauthorized access to the entire system remotely,”.....»»

Category: securitySource:  netsecurityRelated NewsMar 29th, 2024

Stream.Security unveils threat investigation and AI-powered remediation capabilities

Stream.Security announced new threat investigation and AI-powered remediation capabilities. The new real-time attack path detection and generative AI-powered remediation tools are part of the real-time exposure management features that the cloud secu.....»»

Category: securitySource:  netsecurityRelated NewsMar 29th, 2024

New infosec products of the week: March 29, 2024

Here’s a look at the most interesting products from the past week, featuring releases from Bedrock Security, CyberArk, GitGuardian, Legit Security, and Malwarebytes. GitGuardian SCA automates vulnerability detection and prioritization for enhanced.....»»

Category: securitySource:  netsecurityRelated NewsMar 29th, 2024

Patch actively exploited Microsoft SharePoint bug, CISA orders federal agencies (CVE-2023-24955)

The Cybersecurity and Infrastructure Security Agency (CISA) has added CVE-2023-24955 – a code injection vulnerability that allows authenticated attackers to execute code remotely on a vulnerable Microsoft SharePoint Server – to its KEV ca.....»»

Category: securitySource:  netsecurityRelated NewsMar 28th, 2024

AI framework vulnerability is being used to compromise enterprise servers (CVE-2023-48022)

Attackers are leveraging a vulnerability (CVE-2023-48022) in Anyscale’s Ray AI software to compromise enterprise servers and saddle them with cryptominers and reverse shells. “To our knowledge, the attack started 7 months ago,” Avi.....»»

Category: securitySource:  netsecurityRelated NewsMar 27th, 2024

ArmorCode Risk Prioritization provides visibility into security findings with business context

ArmorCode announced ArmorCode Risk Prioritization, providing a 3D scoring approach for managing application security risks. ArmorCode combines the three dimensions of technical severity ratings, unique business context, and insight on whether a threa.....»»

Category: securitySource:  netsecurityRelated NewsMar 26th, 2024

BackBox platform update enhances CVE mitigation and risk scoring

After releasing Network Vulnerability Manager (NVM) in Q4 2023, BackBox has announced a major platform feature update that gives customers the ability to mark irrelevant or already-mitigated Common Vulnerabilities and Exposures (CVEs) as “mitig.....»»

Category: securitySource:  netsecurityRelated NewsMar 26th, 2024