Multiple Vulnerabilities in Adobe Commerce and Magento Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Adobe Commerce and Magento Open Source, the most severe of which could allow for remote code execution. Adobe Commerce...
Dangerous privilege escalation bugs found in Linux package manager Snap
Researchers found an easy-to-exploit vulnerability in Snap, a universal application packaging and distribution system developed for Ubuntu but available on multiple Linux distributions. The flaw...
UK Government Consults on Plans to Restrict Huawei’s Involvement in Telecoms Networks
The consultation will focus on legal mechanisms to restrict the use of Huawei in the UK's infrastructure due to national security concerns Read More
Trickbot Targets 140,000 Victims in 14 Months
Check Point warns of ongoing campaign Read More
Security asset management should be buttoned down. It isn’t.
I’ve been writing recently about security hygiene and posture management. In January, I declared that security hygiene and posture management would become a priority in...
High Severity WordPress Plugin Bug Hits Three Million
Vulnerability could enable threat actors to access backups Read More
CVE-2020-8107
A Process Control vulnerability in ProductAgentUI.exe as used in Bitdefender Antivirus Plus allows an attacker to tamper with product settings via a specially crafted DLL...
Stop pixelating! New tool reveals the secrets of “redacted” documents
A new tool makes crystal clear that it's a big mistake to redact text by pixelating it.. or indeed blurring it, or even applying a...
FlexBooker Data Leak Impacts Millions of End Customers
Researchers find misconfigured AWS S3 bucket Read More
ZDI-22-378: ICONICS GENESIS64 DWG File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of ICONICS GENESIS64. User interaction is required to exploit this vulnerability in that...
