Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2021-0185: INTEL-SA-00708

Improper input validation in the firmware for some Intel(R) Server Board M10JNP Family before version 7.216 may allow a privileged user to potentially enable an escalation of privilege via local access.

CVE
#vulnerability#web#dos#intel#chrome#firefox
Threat Source newsletter (Nov. 10, 2022): Vulnerability research, movies in class, and Emotet once again

Welcome to this week’s edition of the Threat Source newsletter. Tuesday was an absolute hammer for the infosec community. Not only did we have the US elections but we had Emotet returning and a regular Microsoft Tuesday release. That release always leads me to think about the bug

Russia’s Sway Over Criminal Ransomware Gangs Is Coming Into Focus

Questions about the Kremlin’s relationships with these groups remain. But researchers are finally getting some answers.

Managing and Mitigating Risk From Unknown Unknowns

Five practical steps to up-level attack surface management programs and gain greater visibility and risk mitigation around the extended ecosystem.

Evasive KmsdBot Cryptominer/DDoS Bot Targets Gaming, Enterprises

KmsdBot takes advantage of SSH connections with weak login credentials to mine currency and deplete network resources, as it gains a foothold on enterprise systems.

Russia’s New Cyberwarfare in Ukraine Is Fast, Dirty, and Relentless

Security researchers see updated tactics and tools—and a tempo change—in the cyberattacks Russia’s GRU military intelligence agency is inflicting on Ukraine.

Flashpoint Releases Ransomware Prediction Model for Vulnerabilities

Links individual vulnerabilities to those known to have been used in ransomware operations, helping vulnerability management teams prevent potential cyber extortion events with VulnDB.

YouTube Tutorial Videos Spreading Vidar and Raccoon Malware

By Habiba Rashid The new campaign highlights the fact that downloading cracked software is bad news. This is a post from HackRead.com Read the original post: YouTube Tutorial Videos Spreading Vidar and Raccoon Malware

Understanding the Rise of Risk-Based Vulnerability Management

Risk-based vulnerability management solutions foster the convergence of risk management and vulnerability management. Andrew Braunberg explains what’s driving the emergence of RBVM.

GHSA-3wmg-28v9-8hf6: Subrion CMS is vulnerable to Cross-Site Scripting (XSS)

A cross-site scripting (XSS) vulnerability in the /panel/fields/add component of Intelliants Subrion CMS version 4.2.1 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Field default value text field.