The changing role of the MITRE ATT@CK framework
Since its creation in 2013, the MITRE ATT&CK framework has been of interest to security operations professionals. In the early years, the security operations center...
The cybersecurity challenges and opportunities of digital twins
Digital twins are a digital representation of objects, structures or systems that give organizations greater insight into the life cycle of these objects, but this...
Russian Hackers Use Western Networks to Attack Ukraine
Lupovis used decoys to find out more about threat actors Read More
Prolific Chinese Hackers Stole US COVID funds
Secret Service says discovery may be the tip of the iceberg Read More
Multiple Vulnerabilities in Google Android OS Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for arbitrary code execution. Android is an operating system...
CVE-2021-39434
A default username and password for an administrator account was discovered in ZKTeco ZKTime 10.0 through 11.1.0, builds 20180901, 20190510.1, 20200309.3, 20200930, 20201231, and 20210220....
DSA-5297 vlc – security update
A buffer overflow was discovered in the VNC module of the VLC media player, which could result in the execution of arbitrary code. Read More
DSA-5296 xfce4-settings – security update
Robin Peraglie and Johannes Moritz discovered an argument injection bug in the xfce4-mime-helper component of xfce4-settings, which can be exploited using the xdg-open common tool....
Palo Alto Networks looks to shore up healthcare IoT security
Palo Alto Networks today rolled out a new Medical IoT Security offering, designed to provide improved visibility, automated monitoring and more for hitherto vulnerable healthcare...
CVE-2022-23143 (otcp_firmware)
ZTE OTCP product is impacted by a permission and access control vulnerability. Due to improper permission settings, an attacker with high permissions could use this...