Cybercriminals have adopted a novel trick for infecting devices with malware: sending out physical letters that contain malicious QR codes.
Read more in my article on the Hot for Security blog.
Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wordpress-seo
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /var/www/html/wp-includes/functions.php on line 6114
Cybercriminals have adopted a novel trick for infecting devices with malware: sending out physical letters that contain malicious QR codes.
Read more in my article on the Hot for Security blog.
A Russian national suspected of involvement in Phobos ransomware has appeared in court in the US
Fastly claims global organizations are taking 25% longer than expected to recover from security incidents
mingw-python-waitress-2.1.2-7.fc40
Backport fixes for CVE-2024-49768 and CVE-2024-49769.
python-aiohttp-3.9.5-2.el9
Security fix for CVE-2024-52304
python-aiohttp-3.9.5-2.fc39
Security fix for CVE-2024-52304
This vulnerability allows remote attackers to execute arbitrary code on affected installations of RSA Security SecureID Software Token for Microsoft Windows. User interaction is required to exploit this vulnerability in that the target must open a malicious file. The ZDI has assigned a CVSS rating of 7.8.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-10204.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Dassault Syst��mes eDrawings Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-10204.
This vulnerability allows remote attackers to execute arbitrary code on affected installations of WordPress Core. Authentication may be required to exploit this vulnerability, depending on the product configuration. The ZDI has assigned a CVSS rating of 8.8. The following CVEs are assigned: CVE-2024-31210.