CISA: CISA Releases Five Industrial Control Systems Advisories
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on December 17, 2024. These...
CISA Releases Five Industrial Control Systems Advisories CISA released five Industrial Control Systems (ICS) advisories on December 17, 2024. These...
CISA Releases Best Practice Guidance for Mobile Communications Today, CISA released Mobile Communications Best Practice Guidance. The guidance was crafted...
CISA Adds Four Known Exploited Vulnerabilities to Catalog CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Releases Eight Industrial Control Systems Advisories CISA released eight Industrial Control Systems (ICS) advisories on December 19, 2024. These...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds Three Known Exploited Vulnerabilities to Catalog CISA has added three new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
CISA Adds One Known Exploited Vulnerability to Catalog CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based...
Fortinet Releases Security Updates for FortiManager Fortinet released a security update to address a vulnerability in FortiManager. A remote cyber...
CISA Releases Two Industrial Control Systems Advisories CISA released two Industrial Control Systems (ICS) advisories on January 7, 2025. These...
The Information provided at the time of posting was detected as "Covenant C2". Depending on when you are viewing this...
Ransomware Group: FOG VICTIM NAME: Saint-Bar (saintbarbe) NOTE: No files or stolen information are by RedPacket Security. Any legal issues...
Ransomware Group: LYNX VICTIM NAME: astaphanscom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: FUNKSEC VICTIM NAME: ndcegcom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Ransomware Group: LYNX VICTIM NAME: jimthompsoncom NOTE: No files or stolen information are by RedPacket Security. Any legal issues relating...
Vulnerability Summary: CVE-2024-45546 Memory corruption while processing FIPS encryption or decryption IOCTL call invoked from user-space. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-45541 Memory corruption when IOCTL call is invoked from user-space to read board data. Affected Endpoints: No affected...
Vulnerability Summary: CVE-2024-43064 Uncontrolled resource consumption when a driver, an application or a SMMU client tries to access the global...
Vulnerability Summary: CVE-2024-45542 Memory corruption when IOCTL call is invoked from user-space to write board data to WLAN driver. Affected...
Vulnerability Summary: CVE-2024-45559 Transient DOS can occur when GVM sends a specific message type to the Vdev-FastRPC backend. Affected Endpoints:...
Vulnerability Summary: CVE-2024-45558 Transient DOS can occur when the driver parses the per STA profile IE and tries to access...
Vulnerability Summary: CVE-2024-45553 Memory corruption can occur when process-specific maps are added to the global list. If a map is...
Vulnerability Summary: CVE-2024-12970 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') vulnerability in TUBITAK BILGEM...
Vulnerability Summary: CVE-2024-45555 Memory corruption can occur if an already verified IFS2 image is overwritten, bypassing boot verification. This allows...