ZDI-22-1073: Microsoft Windows Untrusted Script Execution Remote Code Execution Vulnerability

Read Time:11 Second

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.

Read More

DSA-5213 schroot – security update

Read Time:13 Second

Julian Gilbey discovered that schroot, a tool allowing users to execute
commands in a chroot environment, had too permissive rules on chroot or
session names, allowing a denial of service on the schroot service for
all users that may start a schroot session.

Read More

CVE-2020-14394

Read Time:14 Second

An infinite loop flaw was found in the USB xHCI controller emulation of QEMU while computing the length of the Transfer Request Block (TRB) Ring. This flaw allows a privileged guest user to hang the QEMU process on the host, resulting in a denial of service.

Read More

New Deep Instinct partner program targets MSSPs fighting ransomware

Read Time:31 Second

Cybersecurity firm Deep Instinct has rolled out a new partner program to provide its endpoint and application protection software to managed security service providers (MSSPs), the company announced Wednesday.

The Stratosphere program was initially announced in April, and designed as a simplified channel program that focuses on expected partner margins, instead of set discounts on the product. Volume-based recognition and “medallion tiers” for sales are out. Instead, the company is offering “loyalty points” for achieving a range of different sales-related goals—like creating leads, getting customers certified, or completing business plans.

To read this article in full, please click here

Read More

Universal database of device vulnerability information launched

Read Time:35 Second

A universal database of agentless devices currently being used on enterprise networks has been announced by DeviceTotal. The new repository allows the company’s customers to identify the accurate security posture for each device in their organization, according to the maker of a security platform for connected devices.

“It’s difficult to get information on agentless devices because every vendor publishes their data the way they want to do it,” explains DeviceTotal founder and CEO Carmit Yadin. “There’s no standardization. There’s no one place you can go today and identify the risk of a device on your network or that you want to purchase. That’s why we created this repository.”

To read this article in full, please click here

Read More