News
vulnerabilities
16 de maio de 2024
Is the VPN Era Ending? Insights for Security Leaders
The landscape of VPN technology is rapidly changing, signaling potential obsolescence as new threats specifically target these technologies. In recent research by Veriti, we've observed a significant increase in attacks on VPN infrastructures, with a focus on exploiting vulnerabilities that have been prevalent but not always prioritized for remediation. In the past few weeks alone, […] The post Is the VPN Era Ending? Insights for Security Leaders appeared first on VERITI. The post Is the VPN Era Ending? Insights for Security Leaders appeared first on Security Boulevard.
16 de maio de 2024
Researchers Discover 11 Vulnerabilities in GE Ultrasound Devices
Researchers identified 11 security flaws in certain GE HealthCare ultrasound devices, including the Invenia ABUS 2.0, that could allow malicious actors with physical access to the devices to implant ransomware or access and manipulate patient data.
16 de maio de 2024
IoT Vulnerabilities and BotNet Infections: A Risk for Executives
The Internet of Things (IoT) has become a cornerstone of business innovation and efficiency. However, the rapid proliferation of IoT devices also introduces significant cybersecurity risks, particularly in the form of IoT vulnerabilities and botnet infections. These risks pose a direct threat to executives, who often use these technologies both personally and professionally. IoT devices […] The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on BlackCloak | Protect Your Digital Life™. The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on Security Boulevard.
16 de maio de 2024
Addressing glibc Vulnerabilities in EOL Ubuntu
Recently, the Ubuntu security team has fixed multiple security issues discovered in the GNU C library, commonly known as glibc. If left unaddressed, this can leave your system exposed to attackers who exploit these glibc vulnerabilities. The glibc library provides the foundation for many programs on your system. Therefore, it is crucial to patch these […] The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on TuxCare. The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on Security Boulevard.
16 de maio de 2024
Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert
In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play Store. Revelations by the Microsoft Threat Intelligence team have unearthed a WPS Office exploit dubbed the Dirty Stream attack, casting a spotlight on […] The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on TuxCare. The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on Security Boulevard.
16 de maio de 2024
Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)
New versions of Git are out, with fixes for five vulnerabilities, the most critical (CVE-2024-32002) of which can be used by attackers to remotely execute code during a “clone” operation. About Git Git is a widely-popular distributed version control system for collaborative software development. It can be installed on machines running Windows, macOS, Linux, and various *BSD distributions. Web-based software development platforms GitHub and GitLab are based on Git. Visual Studio, Microsoft's integrated development environment, … More → The post Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002) appeared first on Help Net Security.
16 de maio de 2024
Vulnerabilities prioritization funnel: Focus on what matters
We are excited to announce updates to our vulnerability prioritization funnel, which will help you focus on vulnerabilities that pose a real danger to your business. The post Vulnerabilities prioritization funnel: Focus on what matters appeared first on Security Boulevard.
16 de maio de 2024
Packet Fence 13.2.0
PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.