Aggregator
Hot Topic breach: Has your credit card info been compromised?
If you’re wondering whether your personal and financial data has been compromised in the massive Hot Topic breach, you can use two separate online tools to check: Have I Been Pwned? or DataBreach.com. Which data was compromised? News of a potential data breach affecting customers of popular US retailers Hot Topic, Torrid, and Box Lunch – all three owned by private equity firm Sycamore Partners – was first reported by Hudson Rock researchers on October … More →
The post Hot Topic breach: Has your credit card info been compromised? appeared first on Help Net Security.
Submit #441900: 上海卓卓网络科技有限公司 DedeCMS(Content management system) V5.7.116 Remote Code Excute [Accepted]
CVE-2015-7084 | Apple Mac OS X up to 10.11.1 Kernel memory corruption (HT205637 / EDB-39357)
CVE-2015-7084 | Apple iOS up to 9.1 Kernel memory corruption (HT205635 / EDB-39357)
CVE-2015-7043 | Apple Mac OS X up to 10.11.1 Kernel denial of service (HT205637 / EDB-38145)
CVE-2015-7042 | Apple iOS up to 9.1 Kernel denial of service (HT205635 / EDB-38917)
CVE-2015-7043 | Apple iOS up to 9.1 Kernel denial of service (HT205635 / EDB-38917)
Мошенники освоили тактику «второго шанса»: как не попасть в ловушку
2024双11,VMware 宣布虚拟机产品 Workstation Pro 和 Fusion Pro 对所有人免费,包括商用
Утечка данных? Страховка возместит: новая защита россиян с 2025 года
Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks
Zscaler announced a Zero Trust Segmentation solution to provide a more secure, agile and cost-effective means to connect users, devices, and workloads across and within globally distributed branches, factories, campuses, data centers, and public clouds. While traditional networks, including SD-WAN and site-to-site VPN, have extended enterprise connectivity to branches and clouds, they have also inadvertently accelerated the spread of ransomware. Although firewalls are used to do segmentation on networks, they add complexity, increase costs, and … More →
The post Zscaler Zero Trust Segmentation prevents lateral movement from ransomware attacks appeared first on Help Net Security.
CVE-2024-49557 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x command injection (dsa-2024-425)
CVE-2024-48838 | Dell SmartFabric OS10 Software 10.5.4.x/10.5.5.x/10.5.6.x file access (dsa-2024-425)
CVE-2024-10695 | Futurio Extra Plugin up to 2.0.13 on WordPress Post information disclosure
CVE-2024-10672 | Multiple Page Generator Plugin up to 4.0.2 on WordPress path traversal
5600 глаз: американец раскрыл масштабы тотальной слежки по всему миру
Black Suit
Apple indeed added a feature called “inactivity reboot” in iOS 18.1 that reboots locked devices
CISA Adds Five Known Exploited Vulnerabilities to Catalog
CISA has added five new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation.
- CVE-2021-26086 Atlassian Jira Server and Data Center Path Traversal Vulnerability
- CVE-2014-2120 Cisco Adaptive Security Appliance (ASA) Cross-Site Scripting (XSS) Vulnerability
- CVE-2021-41277 Metabase GeoJSON API Local File Inclusion Vulnerability
- CVE-2024-43451 Microsoft Windows NTLMv2 Hash Disclosure Spoofing Vulnerability
- CVE-2024-49039 Microsoft Windows Task Scheduler Privilege Escalation Vulnerability
These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.
Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog as a living list of known Common Vulnerabilities and Exposures (CVEs) that carry significant risk to the federal enterprise. BOD 22-01 requires Federal Civilian Executive Branch (FCEB) agencies to remediate identified vulnerabilities by the due date to protect FCEB networks against active threats. See the BOD 22-01 Fact Sheet for more information.
Although BOD 22-01 only applies to FCEB agencies, CISA strongly urges all organizations to reduce their exposure to cyberattacks by prioritizing timely remediation of Catalog vulnerabilities as part of their vulnerability management practice. CISA will continue to add vulnerabilities to the catalog that meet the specified criteria.