top of page

News

vulnerabilities

16 de maio de 2024

Is the VPN Era Ending? Insights for Security Leaders

The landscape of VPN technology is rapidly changing, signaling potential obsolescence as new threats specifically target these technologies. In recent research by Veriti, we've observed a significant increase in attacks on VPN infrastructures, with a focus on exploiting vulnerabilities that have been prevalent but not always prioritized for remediation. In the past few weeks alone, […] The post Is the VPN Era Ending? Insights for Security Leaders appeared first on VERITI. The post Is the VPN Era Ending? Insights for Security Leaders appeared first on Security Boulevard.

16 de maio de 2024

Researchers Discover 11 Vulnerabilities in GE Ultrasound Devices

Researchers identified 11 security flaws in certain GE HealthCare ultrasound devices, including the Invenia ABUS 2.0, that could allow malicious actors with physical access to the devices to implant ransomware or access and manipulate patient data.

16 de maio de 2024

IoT Vulnerabilities and BotNet Infections: A Risk for Executives

The Internet of Things (IoT) has become a cornerstone of business innovation and efficiency. However, the rapid proliferation of IoT devices also introduces significant cybersecurity risks, particularly in the form of IoT vulnerabilities and botnet infections. These risks pose a direct threat to executives, who often use these technologies both personally and professionally. IoT devices […] The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on BlackCloak | Protect Your Digital Life™. The post IoT Vulnerabilities and BotNet Infections: A Risk for Executives appeared first on Security Boulevard.

16 de maio de 2024

Third Chrome Zero-Day Patched by Google Within One Week

Google releases Chrome 125 to the stable channel with patches for nine vulnerabilities, including a zero-day. The post Third Chrome Zero-Day Patched by Google Within One Week appeared first on SecurityWeek.

16 de maio de 2024

Addressing glibc Vulnerabilities in EOL Ubuntu

Recently, the Ubuntu security team has fixed multiple security issues discovered in the GNU C library, commonly known as glibc. If left unaddressed, this can leave your system exposed to attackers who exploit these glibc vulnerabilities. The glibc library provides the foundation for many programs on your system. Therefore, it is crucial to patch these […] The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on TuxCare. The post Addressing glibc Vulnerabilities in EOL Ubuntu appeared first on Security Boulevard.

16 de maio de 2024

Adobe Fixed Multiple Critical Flaws in Acrobat and Reader

Adobe patched 35 security vulnerabilities across a range of its products, including Acrobat, Reader, Illustrator, Substance 3D Painter, Aero, Animate, FrameMaker, and Dreamweaver.

16 de maio de 2024

Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert

In the digital realm, security is paramount, especially when it comes to the applications we use daily. Recently, concerns have surfaced regarding vulnerabilities in popular Android applications available on the Google Play Store. Revelations by the Microsoft Threat Intelligence team have unearthed a WPS Office exploit dubbed the Dirty Stream attack, casting a spotlight on […] The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on TuxCare. The post Xiaomi and WPS Vulnerabilities: File Overwrite Risks Alert appeared first on Security Boulevard.

16 de maio de 2024

Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002)

New versions of Git are out, with fixes for five vulnerabilities, the most critical (CVE-2024-32002) of which can be used by attackers to remotely execute code during a “clone” operation. About Git Git is a widely-popular distributed version control system for collaborative software development. It can be installed on machines running Windows, macOS, Linux, and various *BSD distributions. Web-based software development platforms GitHub and GitLab are based on Git. Visual Studio, Microsoft's integrated development environment, … More → The post Critical Git vulnerability allows RCE when cloning repositories with submodules (CVE-2024-32002) appeared first on Help Net Security.

16 de maio de 2024

Vulnerabilities prioritization funnel: Focus on what matters

We are excited to announce updates to our vulnerability prioritization funnel, which will help you focus on vulnerabilities that pose a real danger to your business. The post Vulnerabilities prioritization funnel: Focus on what matters appeared first on Security Boulevard.

16 de maio de 2024

Packet Fence 13.2.0

PacketFence is a network access control (NAC) system. It is actively maintained and has been deployed in numerous large-scale institutions. It can be used to effectively secure networks, from small to very large heterogeneous networks. PacketFence provides NAC-oriented features such as registration of new network devices, detection of abnormal network activities including from remote snort sensors, isolation of problematic devices, remediation through a captive portal, and registration-based and scheduled vulnerability scans.

bottom of page