Stories from the SOC – RapperBot, Mirai Botnet – C2, CDIR Drop over SSH
Stories from the SOC is a blog series that describes recent real-world security incident investigations conducted and reported by the AT&T SOC analyst team for...
java-latest-openjdk-19.0.2.0.7-1.rolling.el8
FEDORA-EPEL-2023-52e0512741 Packages in this update: java-latest-openjdk-19.0.2.0.7-1.rolling.el8 Update description: New in release OpenJDK 19.0.2 (2023-01-17) CVEs Fixed CVE-2023-21835 CVE-2023-21843 Security Fixes * JDK-8286070: Improve UTF8 representation...
java-latest-openjdk-19.0.2.0.7-1.rolling.el9
FEDORA-EPEL-2023-fc74dc491a Packages in this update: java-latest-openjdk-19.0.2.0.7-1.rolling.el9 Update description: New in release OpenJDK 19.0.2 (2023-01-17) CVEs Fixed CVE-2023-21835 CVE-2023-21843 Security Fixes * JDK-8286070: Improve UTF8 representation...
USN-5833-1: python-future vulnerability
Sebastian Chnelik discovered that python-future incorrectly handled certain HTTP header field. An attacker could possibly use this issue to cause a denial of service. Read...
Killnet Attackers DDoS US and Dutch Hospitals
Retaliatory Russian attacks latest response to geopolitical moves Read More
New UN cybercrime convention has a long way to go in a tight timeframe
Cybercrime is a growing scourge that transcends borders, spreading across the boundaries of virtually all the world's nearly 200 nation-states. From ransomware attacks to rampant...
Two US Doctors Convicted of $30m Medicare Fraud
Claims submitted for medical equipment not needed by patients Read More
QNAP: Patch Critical Remote Code Injection Bug
Vulnerability affects QTS and QuTS Hero firmware Read More
Trovent Security Advisory 2203-01 / Micro Focus GroupWise transmits session ID in URL
Posted by Stefan Pietsch on Jan 30 # Trovent Security Advisory 2203-01 # ##################################### Micro Focus GroupWise transmits session ID in URL ################################################# Overview ########...
ZDI-23-093: Cacti poll_for_data Command Injection Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Cacti. Authentication is not required to exploit this vulnerability. Read More