- + VU#138043: A stack-based overflow vulnerability exists in the Microchip Advanced Software Framework (ASF) implementation of the tinydhcp server—Overview A stack-based overflow vulnerability exists in the tinydhcp...
- + VU#455367: Insecure Platform Key (PK) used in UEFI system firmware signature—Overview A vulnerability in the user of hard-coded Platform Keys (PK...
- + VU#244112: Multiple SMTP services are susceptible to spoofing attacks due to insufficient enforcement—Overview Multiple hosted, outbound SMTP servers are vulnerable to em...
- + VU#312260: Use-after-free vulnerability in lighttpd version 1.4.50 and earlier—Overview A use-after-free vulnerability in lighttpd in versions 1.4....
- + VU#456537: RADIUS protocol susceptible to forgery attacks.—Overview A vulnerability in the RADIUS protocol allows an attacker a...
- + VU#163057: BMC software fails to validate IPMI session.—Overview The Intelligent Platform Management Interface (IPMI) implem...
- + VU#238194: R Programming Language implementations are vulnerable to arbitrary code execution during deserialization of .rds and .rdx files—Overview A vulnerability in the R language that allows for arbitrary...
- + VU#253266: Keras 2 Lambda Layers Allow Arbitrary Code Injection in TensorFlow Models—Overview Lambda Layers in third party TensorFlow-based Keras models ...
- + VU#123335: Multiple programming languages fail to escape arguments properly in Microsoft Windows—Overview Various programming languages lack proper validation mechan...
- show more ...
As of 10/5/24 11:49pm. Last new 9/30/24 8:59pm. Score: 640
- + Election offices are preparing for a smooth voting process — and angry voters—html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org...
- + Former Mesa County clerk sentenced to 9 years for 2020 voting system breach—Former Mesa County clerk sentenced to 9 years for 2020 voting system b...
- + What’s new from this year’s Counter Ransomware Initiative summit, and what’s next—What’s new from this year’s Counter Ransomware Initiative summit, and ...
- + DOJ, Microsoft seize more than 100 domains used by the FSB—html PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN" "http://www.w3.org...
- + Research reveals vulnerabilities in routers that left 700,000-plus exposed—Research reveals vulnerabilities in routers that left 700,000-plus exp...
- + Russian authorities arrest nearly 100 in raids tied to cybercriminal money laundering—Russian authorities arrest nearly 100 in raids tied to cybercriminal m...
- + America’s allies are shifting: Cyberspace is about persistence, not deterrence—America’s allies are shifting: Cyberspace is about persistence, not de...
- show more ...
As of 10/5/24 11:55pm. Last new 10/3/24 4:39pm. Score: 582
- + ISC StormCast for Friday, October 4th, 2024—Kickstart Your DShield Honeypot https://isc.sans.edu/diary/Kickstar...
- + ISC StormCast for Thursday, October 3rd, 2024—Security Related Docker Containers https://isc.sans.edu/diary/Secur...
- show more ...
As of 10/5/24 11:58pm. Last new 10/4/24 2:02am. Score: 536
- + CISA Adds One Known Exploited Vulnerability to Catalog—CISA has added one new vulnerability to its Known Exploited Vuln...
- + Russian Military Cyber Actors Target US and Global Critical Infrastructure—Summary The Federal Bureau of Investigation (FBI), Cybersecurity an...
- + #StopRansomware: RansomHub Ransomware—Summary Note: This joint Cybersecurity Advisory is part of an on...
- + Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations—Summary The Federal Bureau of Investigation (FBI), Cybersecurity an...
- + North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs—Summary The U.S. Federal Bureau of Investigation (FBI) and the foll...
- + CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth—EXECUTIVE SUMMARY In early 2023, the Cybersecurity and Infrastructur...
- + People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action —Overview Background This advisory, authored by the Australian Sig...
- + #StopRansomware: Black Basta—SUMMARY Note : This joint Cybersecurity Advisory (CSA) is part of...
- + #StopRansomware: Akira Ransomware—SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of...
- + Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure and Policy Secure Gateways—SUMMARY The Cybersecurity and Infrastructure Security Agency (CISA)...
As of 10/5/24 11:59pm. Last new 9/30/24 11:35pm. Score: 529
- + Friday Squid Blogging: Map of All Colossal Squid Sightings—Interesting map , from this paper . Blog moderation policy. [Aut...
- + Weird Zimbra Vulnerability—Hackers can execute commands on a remote computer by sending malforme...
- + California AI Safety Bill Vetoed—Governor Newsom has vetoed the state’s AI safety bill. I ha...
- + Hacking ChatGPT by Planting False Memories into Its Data—This vulnerability hacks a feature that allows ChatGPT to have long-te...
- + Friday Squid Blogging: Squid Game Season Two Teaser—The teaser for Squid Game Season Two dropped. Blog moderation ...
- + Clever Social Engineering Attack Using Captchas—This is really interesting. It’s a phishing attack targeting...
- + FBI Shuts Down Chinese Botnet—The FBI has shut down a botnet run by Chinese hackers: The botne...
- + AI and the 2024 US Elections—For years now, AI has undermined the public’s ability to trust w...
- + Squid Fishing in Japan—Fishermen are catching more squid as other fish are depleted. Bl...
- + NIST Recommends Some Common-Sense Password Rules—NIST’s second draft of its “ SP 800-63-4 “—its...
- show more ...
As of 10/6/24 12:01am. Last new 10/4/24 6:20pm. Score: 508
- + Friday Squid Blogging: Map of All Colossal Squid Sightings—Interesting map , from this paper . Blog moderation policy. [Aut...
- + Weird Zimbra Vulnerability—Hackers can execute commands on a remote computer by sending malforme...
- + California AI Safety Bill Vetoed—Governor Newsom has vetoed the state’s AI safety bill. I ha...
- + Hacking ChatGPT by Planting False Memories into Its Data—This vulnerability hacks a feature that allows ChatGPT to have long-te...
- + Friday Squid Blogging: Squid Game Season Two Teaser—The teaser for Squid Game Season Two dropped. Blog moderation ...
- + Clever Social Engineering Attack Using Captchas—This is really interesting. It’s a phishing attack targeting...
- + FBI Shuts Down Chinese Botnet—The FBI has shut down a botnet run by Chinese hackers: The botne...
- + AI and the 2024 US Elections—For years now, AI has undermined the public’s ability to trust w...
- + Squid Fishing in Japan—Fishermen are catching more squid as other fish are depleted. Bl...
- + NIST Recommends Some Common-Sense Password Rules—NIST’s second draft of its “ SP 800-63-4 “—its...
- show more ...
As of 10/6/24 12:01am. Last new 10/4/24 8:08pm. Score: 476
- + CISA Adds One Known Exploited Vulnerability to Catalog—CISA has added one new vulnerability to its Known Exploited Vuln...
- + Russian Military Cyber Actors Target US and Global Critical Infrastructure—Summary The Federal Bureau of Investigation (FBI), Cybersecurity an...
- + #StopRansomware: RansomHub Ransomware—Summary Note: This joint Cybersecurity Advisory is part of an on...
- + Iran-based Cyber Actors Enabling Ransomware Attacks on US Organizations—Summary The Federal Bureau of Investigation (FBI), Cybersecurity an...
- + North Korea Cyber Group Conducts Global Espionage Campaign to Advance Regime’s Military and Nuclear Programs—Summary The U.S. Federal Bureau of Investigation (FBI) and the foll...
- + CISA Red Team’s Operations Against a Federal Civilian Executive Branch Organization Highlights the Necessity of Defense-in-Depth—EXECUTIVE SUMMARY In early 2023, the Cybersecurity and Infrastructur...
- + People’s Republic of China (PRC) Ministry of State Security APT40 Tradecraft in Action —Overview Background This advisory, authored by the Australian Sig...
- + #StopRansomware: Black Basta—SUMMARY Note : This joint Cybersecurity Advisory (CSA) is part of...
- + #StopRansomware: Akira Ransomware—SUMMARY Note: This joint Cybersecurity Advisory (CSA) is part of...
- show more ...
As of 10/6/24 12:01am. Last new 9/30/24 8:55pm. Score: 460
- + Pixel's Proactive Approach to Security: Addressing Vulnerabilities in Cellular Modems—Posted by Sherk Chung, Stephan Chen, Pixel team, and Roger Piqueras Jo...
- + Evaluating Mitigations & Vulnerabilities in Chrome—Posted by Alex Gough, Chrome Security Team The Chrome Security Tea...
- + A new path for Kyber on the web—Posted by David Adrian, David Benjamin, Bob Beck & Devon O'Brien, ...
- + Deploying Rust in Existing Firmware Codebases—Posted by Ivan Lozano and Dominik Maier, Android Team Android's use...
- + Private AI For All: Our End-To-End Approach to AI Privacy on Android—Posted by Dave Kleidermacher, VP Engineering, Android Security and Pri...
- + Post-Quantum Cryptography: Standards and Progress—Posted by Royal Hansen, VP, Privacy, Safety and Security Engineering, ...
- + Keeping your Android device safe from text message fraud—Posted by Nataliya Stanetsky and Roger Piqueras Jover, Android Securit...
- + Improving the security of Chrome cookies on Windows—Posted by Will Harris, Chrome Security Team Cybercriminals using c...
- + Building security into the redesigned Chrome downloads experience—Posted by Jasika Bawa, Lily Chen, and Daniel Rubery, Chrome Security ...
- + Sustaining Digital Certificate Security - Entrust Certificate Distrust—Posted by Chrome Root Program, Chrome Security Team Update (09/1...
- show more ...
As of 10/6/24 12:01am. Last new 10/3/24 1:03pm. Score: 459
- + MAR-10448362-1.v1 Volt Typhoon—Notification This report is provided "as is" for informational pur...
- + MAR-10478915-1.v1 Citrix Bleed— Notification This report is provided "as...
- + MAR-10454006.r5.v1 SUBMARINE, SKIPJACK, SEASPRAY, WHIRLPOOL, and SALTWATER Backdoors — Notification This report is provided "...
- + MAR-10430311-1.v1 Multiple Nation-State Threat Actors Exploit CVE-2022-47966 and CVE-2022-42475— Notification This report is provided "as...
- + Infamous Chisel Malware Analysis Report—Infamous Chisel–A collection of components associated with Sandworm de...
- + MAR-10459736.r1.v1 WHIRLPOOL Backdoor— Notification This report is provided "...
- + MAR-10454006.r4.v2 SEASPY and WHIRLPOOL Backdoors— Notification This report is provided "as is" f...
- + MAR-10454006-r3.v1 Exploit Payload Backdoor — Notification This report is provided "as...
- + MAR-10454006-r2.v1 SEASPY Backdoor — Notification This report is provided "as...
- + MAR-10454006-r1.v2 SUBMARINE Backdoor— Notification This report is provided "as is" ...
As of 10/6/24 12:03am. Last new 10/1/24 12:24am. Score: 450
- + CISA is warning us (again) about the threat to critical infrastructure networks—Government-run water systems and other critical infrastructure are sti...
- + Threat actor believed to be spreading new MedusaLocker variant since 2022—Cisco Talos has discovered a financially motivated threat actor, activ...
- + Are hardware supply chain attacks “cyber attacks?”—The recent attacks in the Middle East triggering explosions on pag...
- + Simple Mail Transfer Pirates: How threat actors are abusing third-party infrastructure to send spam—Attackers are abusing normal features of legitimate web sites to trans...
- + Talos discovers denial-of-service vulnerability in Microsoft Audio Bus; Potential remote code execution in popular open-source PLC—Cisco Talos’ Vulnerability Research team recently disclosed two...
- + Talk of election security is good, but we still need more money to solve the problem—Last week, six Secretaries of State testified to U.S. Congress about...
- + We can try to bridge the cybersecurity skills gap, but that doesn’t necessarily mean more jobs for defenders—I have written about the dreaded “cybersecurity skills gap...
- + Vulnerability in Acrobat Reader could lead to remote code execution; Microsoft patches information disclosure issue in Windows API—Cisco Talos’ Vulnerability Research team discovered two vulnera...
- + Four zero-days included in group of 79 vulnerabilities Microsoft discloses, including one with 9.8 severity score—Microsoft disclosed four vulnerabilities that are actively being ...
- + DragonRank, a Chinese-speaking SEO manipulator service provider—Key Takeaways Cisco Talos is disclosing a new threat called ...
- show more ...
As of 10/6/24 12:03am. Last new 10/3/24 5:33pm. Score: 449