vulnerability
Recent Critical Vulnerabilities: August 2024 CVE Roundup
Protecting Organizations with Up-to-Date CVE Awareness Reports from the National Institute of Standards and Technology (NIST) through its National Vulnerability Database (NVD) highlight critical cybersecurity vulnerabilities that demand immediate attention and underscore ...
Miggo Uncovers AWS Load Balancer Security Flaw
Miggio has discovered a configuration-based vulnerability that enables cybercriminals to bypass authentication and authorization services provided by the Application Load Balancer (ALB) from Amazon Web Services (AWS) that could affect more than ...
CVE-2024-38178 Vulnerability within Microsoft Edge
High threat level vulnerability CVE-2024-38178 discovered on Microsoft Edge browser : OFFICIAL CVE-2024-38178 PATCHING INFORMATION : A recent discovery has unveiled CVE-2024-38178, a critical vulnerability within Microsoft Windows, which impacts Internet Explorer ...
Recent Vulnerabilities in Cybersecurity: July 2024 CVE Roundup
Recent cybersecurity vulnerabilities reported on the National Institute of Standards and Technology (NIST)’s National Vulnerability Database pose significant risks to organizations worldwide. Without mitigation, data breaches and system compromises are possible. July’s ...
Npm packages conceal macOS malware in ‘travis.yml’ files, drop bogus “Safari Updates”
Three npm packages identified by Sonatype this week conceal malware in "travis.yml," a CI/CD build configuration file used by Travis CI. These packages contain metadata, description, and code copied from the legitimate ...
Networking Equipment Riddled With Software Supply Chain Risks
Outdated software components often contain vulnerabilities that have been discovered and are well-understood by threat actors ...
Critical SSH Vulnerability, Facial Recognition Flaws, How to Safely Dispose of Old Devices
In episode 337, we cover “broken” news about the new SSH vulnerability ‘regreSSHion‘ highlighting the vulnerability discovered in the OpenSSH protocol by Qualys and its implications. We then discuss the Detroit Police ...
OpenSSH regreSSHion Vulnerability
…and…How AI Can Revolutionize Code and Regression Testing Introduction Artificial Intelligence (AI) is transforming numerous industries, and software development is no exception. One of the critical areas where AI can make a ...
SCCM Exploitation: Evading Defenses and Moving Laterally with SCCM Application Deployment
TL;DR: Compromise of an SCCM administrator account can easily lead to compromise of every machine managed by SCCM. As this […] ...
Ransomware Group Jumps on PHP Vulnerability
A long-running ransomware campaign that has been targeting Windows and Linux systems since 2019 is the latest example of how closely threat groups track public disclosures of vulnerabilities and proofs-of-concept (PoCs) and ...