Tag: patching

  • Cloud Blog: How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends

    Source URL: https://cloud.google.com/blog/topics/threat-intelligence/time-to-exploit-trends-2023/ Source: Cloud Blog Title: How Low Can You Go? An Analysis of 2023 Time-to-Exploit Trends Feedly Summary: Written by: Casey Charrier, Robert Weiner Mandiant analyzed 138 vulnerabilities that were disclosed in 2023 and that we tracked as exploited in the wild. Consistent with past analyses, the majority (97) of these vulnerabilities were…

  • The Register: Thousands of Fortinet instances vulnerable to actively exploited flaw

    Source URL: https://www.theregister.com/2024/10/14/fortinet_vulnerability/ Source: The Register Title: Thousands of Fortinet instances vulnerable to actively exploited flaw Feedly Summary: No excuses for not patching this nine-month-old issue More than 86,000 Fortinet instances remain vulnerable to the critical flaw that attackers started exploiting last week, according to Shadowserver’s data.… AI Summary and Description: Yes Summary: The text…

  • The Register: US and UK govts warn: Russia scanning for your unpatched vulnerabilities

    Source URL: https://www.theregister.com/2024/10/12/russia_is_targeting_you_for/ Source: The Register Title: US and UK govts warn: Russia scanning for your unpatched vulnerabilities Feedly Summary: Also, phishing’s easier over the phone, and your F5 cookies might be unencrypted, and more in brief If you need an excuse to improve your patching habits, a joint advisory from the US and UK…

  • Cloud Blog: How Google Cloud supports telecom security and compliance

    Source URL: https://cloud.google.com/blog/products/identity-security/how-google-cloud-supports-telecom-regulatory-compliance/ Source: Cloud Blog Title: How Google Cloud supports telecom security and compliance Feedly Summary: Operating a telecommunications network is more than just connecting phone calls, or helping people share funny videos online. Telecom networks are critical components of our society’s infrastructure. Telecom operators face a wide array of risks to the critical…

  • The Register: CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame

    Source URL: https://www.theregister.com/2024/10/10/cisa_ivanti_fortinet_vulns/ Source: The Register Title: CISA adds fresh Ivanti vuln, critical Fortinet bug to hall of shame Feedly Summary: Usual three-week window to address significant risks to federal agencies applies The US Cybersecurity and Infrastructure Security Agency (CISA) says vulnerabilities in Fortinet and Ivanti products are now being exploited, earning them places in…

  • Krebs on Security: Patch Tuesday, October 2024 Edition

    Source URL: https://krebsonsecurity.com/2024/10/patch-tuesday-october-2024-edition/ Source: Krebs on Security Title: Patch Tuesday, October 2024 Edition Feedly Summary: Microsoft today released security updates to fix at least 117 security holes in Windows computers and other software, including two vulnerabilities that are already seeing active attacks. Also, Adobe plugged 52 security holes across a range of products, and Apple…

  • The Register: ‘Critical’ CUPS vulnerability chain easy to use for massive DDoS attacks

    Source URL: https://www.theregister.com/2024/10/07/critical_cups_vulnerability_chain_easy/ Source: The Register Title: ‘Critical’ CUPS vulnerability chain easy to use for massive DDoS attacks Feedly Summary: Also, rooting for Russian cybercriminals, a new DDoS record, sneaky Linux server malware and more Infosec In Brief The critical vulnerability in the Common Unix Printing System (CUPS) reported last week might have required some…

  • The Register: ‘Patch yesterday’: Zimbra mail servers under siege through RCE vuln

    Source URL: https://www.theregister.com/2024/10/02/mass_exploitation_of_zimbra_rce/ Source: The Register Title: ‘Patch yesterday’: Zimbra mail servers under siege through RCE vuln Feedly Summary: Attacks began the day after public disclosure “Patch yesterday" is the advice from infosec researchers as the latest critical vulnerability affecting Zimbra mail servers is now being mass-exploited.… AI Summary and Description: Yes Summary: The text…

  • Hacker News: Ldd(1) and Untrusted Binaries (2023)

    Source URL: https://jmmv.dev/2023/07/ldd-untrusted-binaries.html Source: Hacker News Title: Ldd(1) and Untrusted Binaries (2023) Feedly Summary: Comments AI Summary and Description: Yes Summary: This text highlights a significant security concern about the `ldd` command, which can run untrusted binaries and introduce vulnerabilities. The discussion emphasizes the importance of understanding tool behaviors in security contexts, particularly for professionals…

  • Slashdot: CISA Boss: Makers of Insecure Software Are the Real Cyber Villains

    Source URL: https://developers.slashdot.org/story/24/09/20/1936214/cisa-boss-makers-of-insecure-software-are-the-real-cyber-villains?utm_source=rss1.0mainlinkanon&utm_medium=feed Source: Slashdot Title: CISA Boss: Makers of Insecure Software Are the Real Cyber Villains Feedly Summary: AI Summary and Description: Yes Summary: Jen Easterly, the head of the US Cybersecurity and Infrastructure Security Agency, emphasizes the responsibility of software developers in creating secure code. During her keynote at the Mandiant mWise conference,…