Tag
#ios
In late October two new buffer overflow vulnerabilities, CVE-2022-3602 and CVE-2022-3786, were announced in OpenSSL versions 3.0.0 to 3.0.6. These vulnerabilities can be exploited by sending an X.509 certificate with a specially crafted email address, potentially causing a buffer overflow resulting in a crash or
New web targets for the discerning hacker
New offering goes beyond industry requirements to help maximize the value of SIEM investments.
Grant will be used to design reliable method of reducing cybersecurity gaps that lead to data breaches and develop a training course.
** UNSUPPORTED WHEN ASSIGNED ** Oracle Solaris version 10 1/13, when using the Common Desktop Environment (CDE), is vulnerable to a privilege escalation vulnerability. A low privileged user can escalate to root by crafting a malicious printer and double clicking on the the crafted printer's icon.
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212563.
CTO recognized as cybersecurity influencer for his research and thought leadership.
Categories: News Tags: week in security Tags: weekly blog roundup The most important and interesting computer security stories from the last week. (Read more...) The post A week in security (October 24 - 30) appeared first on Malwarebytes Labs.
Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Oct. 21 and Oct. 28. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key
The next generation of cybersecurity pros will need to participate frequently in relevant training to expand their skills and stay engaged.