Tag: update

  • The Register: Hm, why are so many DrayTek routers stuck in a bootloop?

    Source URL: https://www.theregister.com/2025/03/25/draytek_routers_bootloop/ Source: The Register Title: Hm, why are so many DrayTek routers stuck in a bootloop? Feedly Summary: Time to update your firmware, if you can, to one with the security fixes, cough cough DrayTek router owners in the UK and beyond had a pretty miserable weekend after some ISPs began to notice…

  • Hacker News: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx)

    Source URL: https://www.wiz.io/blog/ingress-nginx-kubernetes-vulnerabilities Source: Hacker News Title: RCE Vulnerabilities in K8s Ingress Nginx (9.8 CVE for ingress-Nginx) Feedly Summary: Comments AI Summary and Description: Yes ### Summary: The text outlines the discovery of significant vulnerabilities in the Ingress NGINX Controller for Kubernetes, known as IngressNightmare. These vulnerabilities, which allow unauthenticated Remote Code Execution (RCE), pose…

  • Hacker News: Multiple vulnerabilities in ingress-Nginx (Score 9.8)

    Source URL: https://groups.google.com/g/kubernetes-security-announce/c/2qa9DFtN0cQ Source: Hacker News Title: Multiple vulnerabilities in ingress-Nginx (Score 9.8) Feedly Summary: Comments AI Summary and Description: Yes Summary: The text discusses critical vulnerabilities in the ingress-nginx component of Kubernetes that could lead to arbitrary code execution and secret disclosure. The seriousness of these vulnerabilities necessitates immediate action, specifically patching or upgrading…

  • Alerts: CISA Adds One Known Exploited Vulnerability to Catalog

    Source URL: https://www.cisa.gov/news-events/alerts/2025/03/24/cisa-adds-one-known-exploited-vulnerability-catalog Source: Alerts Title: CISA Adds One Known Exploited Vulnerability to Catalog Feedly Summary: CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2025-30154 reviewdog action-setup GitHub Action Embedded Malicious Code Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and…

  • Cisco Security Blog: Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy

    Source URL: https://feedpress.me/link/23535/16990587/cisco-co-authors-update-to-nist-adversarial-machine-learning-taxonomy Source: Cisco Security Blog Title: Cisco Co-Authors Update to the NIST Adversarial Machine Learning Taxonomy Feedly Summary: Cisco and the UK AI Security Institute partnered with NIST to release the latest update to the Adversarial Machine Learning Taxonomy. AI Summary and Description: Yes Summary: The collaboration between Cisco, the UK AI Security…

  • The Register: China bans compulsory facial recognition and its use in private spaces like hotel rooms

    Source URL: https://www.theregister.com/2025/03/23/asia_tech_news_in_brief/ Source: The Register Title: China bans compulsory facial recognition and its use in private spaces like hotel rooms Feedly Summary: PLUS: Zoho’s Ulaa anointed India’s most patriotic browser; Typhoon-like gang targets Taiwan; Japan debates offensive cyber-ops; and more Asia In Brief China’s Cyberspace Administration and Ministry of Public Security have outlawed the…

  • The Register: Oracle Cloud says it’s not true someone broke into its login servers and stole data

    Source URL: https://www.theregister.com/2025/03/23/oracle_cloud_customers_keys_credentials/ Source: The Register Title: Oracle Cloud says it’s not true someone broke into its login servers and stole data Feedly Summary: Despite evidence to the contrary as alleged pilfered info goes on sale Oracle has straight up denied claims by a miscreant that its public cloud offering has been compromised and information…