RansomHub Overtakes LockBit as Most Prolific Ransomware Group
Symantec data reveals RansomHub claimed more attacks than any other group in Q3 2024 Read More
Pitfalls of Cloud Sprawl and How to Avoid Them
The content of this post is solely the responsibility of the author. LevelBlue does not adopt or endorse any of the views, positions, or information...
Two-thirds of Attributable Malware Linked to Nation States
Netskope claims 66% of malware attacks last year were backed by nation states Read More
CISA Seeks Feedback on Upcoming Product Security Flaws Guidance
CISA is asking for feedback on future guidance outlining bad security practices in product development as part of its Secure by Design initiative Read More
NIS2 Confusion: Concerns Over Readiness as Deadline Reached
NIS2 will be enforced as of October 17, yet many organizations and even EU member states appear completely unprepared for implementation Read More
ZDI-24-1419: Trend Micro Deep Security Improper Access Control Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Trend Micro Deep Security. An attacker must first obtain the ability to execute...
ZDI-24-1412: Oracle VirtualBox Shared Folders Incorrect Authorization Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute low-privileged code...
ZDI-24-1413: Oracle VirtualBox TPM Heap-based Buffer Overflow Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged code...
ZDI-24-1414: Oracle VirtualBox BusLogic Uninitialized Memory Information Disclosure Vulnerability
This vulnerability allows local attackers to disclose sensitive information on affected installations of Oracle VirtualBox. An attacker must first obtain the ability to execute high-privileged...
ZDI-24-1415: Schneider Electric Zelio Soft 2 ZM2 File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Schneider Electric Zelio Soft 2. User interaction is required to exploit this...