Security
Headlines
HeadlinesLatestCVEs

Tag

#log4j

CVE-2023-21850: Oracle Critical Patch Update Advisory - January 2023

Vulnerability in the Oracle Demantra Demand Management product of Oracle Supply Chain (component: E-Business Collections). Supported versions that are affected are 12.1 and 12.2. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle Demantra Demand Management. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Demantra Demand Management accessible data. CVSS 3.1 Base Score 7.5 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N).

CVE
#sql#vulnerability#web#mac#windows#apple#google#linux#apache#nodejs#js#java#oracle#kubernetes#intel#php#c++#perl#pdf#log4j#graalvm#auth#ssh#zero_day#docker#webkit#kotlin#ssl
3 Lessons Learned in Vulnerability Management

In 2022, multiple high-profile vulnerabilities like Log4j and OpenSSL provided important takeaways for future public reporting.

APT Topic Summary Report: Cisco Talos Year in Review 2022

State-sponsored or state-aligned advanced persistent threats (APTs) adapted to the changing geopolitical landscape in 2022. Cisco Talos observed several offensive cyber campaigns linked to several groups stemming from Russia, Iran, China, North Korea, and countries in the Indian subcontinent...

Threat Source newsletter (Jan. 5, 2023): Digging out of our inboxes

Happy New Year and welcoem to this week's edition of the Threat Source newsletter. We can’t tell if it’s the fog from Lurene’s deadly eggnog or dare we say pure rest and relaxation but we’re still digging out of our

Stupid security 2022 – this year’s infosec fails

Epic web security fails and salutary lessons from another inevitably eventful year in infosec

Internet AppSec Remains Abysmal & Requires Sustained Action in 2023

A variety of initiatives — such as memory-safe languages and software bills of materials — promise more secure applications, but sustained improvements will require that vendors do much better, researchers agree.

Supply Chain Risks Got You Down? Keep Calm and Get Strategic!

Security leaders must maintain an effective cybersecurity strategy to help filter some of the noise on new vulnerabilities.