Ransomware Suspected in Wiltshire Farm Foods Attack
Food manufacturer reveals system outage Read More
ZDI-22-877: Apple macOS PackageKit PKCoreShove Link Following System Integrity Protection Bypass Vulnerability
This vulnerability allows local attackers to bypass System Integrity Protection on affected installations of Apple macOS. An attacker must first obtain the ability to execute...
ZDI-22-878: Apple macOS PackageKit PKInstallService Directory Traversal System Integrity Protection Bypass Vulnerability
This vulnerability allows local attackers to bypass System Integrity Protection on affected installations of Apple macOS. An attacker must first obtain the ability to execute...
ZDI-22-879: ZyXel AP Configurator Incorrect Permission Assignment Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of ZyXel AP Configurator. An attacker must first obtain the ability to execute low-privileged...
ZDI-22-874: ABB e-Design Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of ABB e-Design. An attacker must first obtain the ability to execute low-privileged code...
ZDI-22-875: ABB e-Design Link Following Denial-of-Service Vulnerability
This vulnerability allows local attackers to create a denial-of-service condition on affected installations of ABB e-Design. An attacker must first obtain the ability to execute...
ZDI-22-876: Apache HTTPD Server ap_escape_html2 Integer Overflow Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Apache HTTPD Server. Authentication is not required to exploit this vulnerability. Read...
DSA-5172 firefox-esr – security update
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code or spoofing. Read...
How to Build Cybersecurity Compliance with Free CIS Resources
Cybersecurity compliance doesn't have to be overwhelming. Organizations can use free CIS resources to build a plan that works for them. Read More
The Link Between AWM Proxy & the Glupteba Botnet
On December 7, 2021, Google announced it was suing two Russian men allegedly responsible for operating the Glupteba botnet, a global malware menace that has...