OpenSSL fixes two high severity vulnerabilities, what you need to know
CVE-2022-3602 is an arbitrary 4-byte stack buffer overflow that could trigger crashes or lead to remote code execution (RCE)
Read More...CVE-2022-3602 is an arbitrary 4-byte stack buffer overflow that could trigger crashes or lead to remote code execution (RCE)
Read More...Researcher discovered a remote code execution vulnerability in the open-source Apache Commons Text library
Read More...Threat actors who accessed the bucket may use this information in different forms for extortion, blackmailing, creating social engineering tactics with the help of exposed information, or simply selling the information to the highest bidder on the dark web and Telegram channels
Read More...The size of the threat depends on the number of clusters set up within user organizations and if those have non-admin users that use the CreateComposeApplication role to create applications and the vulnerable SFXv1
Read More...Some notable commands issued include exfiltrating the list of running processes, enumerating files in specific folders, launching whoami, and deleting files under the public user folders
Read More...As of October 15, 2022, VMware ESXi 6.5 and VMware ESXi 6.7 reached end-of-life and will only receive technical support but no security updates, putting the software at risk of vulnerabilities
Read More...Home users can defend against a ransomware attack by regular backups of their files and keeping them on an offline storage device
Read More...The evolution of email-based phishing threats into a service-based economy means that adversaries who aim to conduct phishing attacks can now simply purchase such resources and infrastructure without having to work on it themselves
Read More...In light of the critical nature of the vulnerability, users are recommended to update to the latest version as soon as possible to mitigate possible threats.
Read More...These intrusions typically rely on waves of spam messages that deliver malware-laced documents or embedded URLs, which, when opened or clicked, lead to malware deployment
Read More...