Security
Headlines
HeadlinesLatestCVEs

Tag

#intel

CVE-2022-1654: Critical Privilege Escalation Vulnerability in Jupiter and JupiterX Premium Themes

Jupiter Theme <= 6.10.1 and JupiterX Core Plugin <= 2.0.7 allow any authenticated attacker, including a subscriber or customer-level attacker, to gain administrative privileges via the "abb_uninstall_template" (both) and "jupiterx_core_cp_uninstall_template" (JupiterX Core Only) AJAX actions

CVE
#vulnerability#dos#wordpress#intel#php#auth
Hello XD Ransomware Installing Backdoor on Targeted Windows and Linux Systems

Windows and Linux systems are being targeted by a ransomware variant called HelloXD, with the infections also involving the deployment of a backdoor to facilitate persistent remote access to infected hosts. "Unlike other ransomware groups, this ransomware family doesn't have an active leak site; instead it prefers to direct the impacted victim to negotiations through Tox chat and onion-based

Security Leaders Discuss Industry Drivers at Dark Reading's News Desk at RSAC 2022

Tune into Dark Reading's News Desk interviews with the industry’s leaders, discussing news and hot topics, such as this year’s "Transofrm" theme, at RSA Conference 2022 in San Francisco

CVE-2021-41502: [XSS!!]When modifying a written blog, you can modify the name of the uploaded picture to cause a stored XSS vulnerability · Issue #885 · intelliants/subrion

An issue was discovered in Subrion CMS v4.2.1 There is a stored cross-site scripting (XSS) vulnerability that can execute malicious JavaScript code by modifying the name of the uploaded image, closing the html tag, or adding the onerror attribute.

CrowdStrike Introduces Humio for Falcon, Redefining Threat Hunting with Unparalleled Scale and Speed

Humio for Falcon provides long-term, cost-effective data retention with powerful index-free search and analysis of enriched security telemetry across enterprise environments

CrowdStrike Introduces CrowdStrike Asset Graph to Help Organizations Proactively Identify and Eliminate Blind Spots

CrowdStrike Asset Graph provides unprecedented visibility of assets in an IT environment to optimize cyber defense strategies and manage risk.

EU Debates AI Act to Protect Human Rights, Define High-Risk Uses

The commission argues that legislative action is needed to ensure a well-functioning market for AI systems that balances benefits and risks.

New Linux Malware 'Nearly Impossible to Detect'

So-called Symbiote malware, first found targeting financial institutions, contains stealthy rootkit capabilities.