Category: EN

AttackIQ Bolsters Cyber Defenses with DeepSurface’s Risk-Analysis Tech

This week, AttackIQ acquired DeepSurface to broaden its vulnerability and attack path management capabilities to help enterprises identify and mitigate the most pressing vulnerabilities in their environments. The acquisition enables AttackIQ to add automated vulnerability prioritization within complex IT environments.…

SOC 2 Made Simple: Your Guide to Certification

No matter where your company is located and in which field it operates, one thing is always true: today, SOC 2 is one of the standards tech companies should meet to be recognized for their security practices. If you’re tackling…

What is Internet Key Exchange (IKE)?

This post doesn’t have text content, please click on the link below to view the original article. This article has been indexed from Search Security Resources and Information from TechTarget Read the original article: What is Internet Key Exchange (IKE)?

Some updates to our data feeds, (Tue, Feb 4th)

We have offered several different data feeds via our API or other means. However, we are often not very good at documenting what these feeds are all about. Currently, I am in the process of fixing the documentation around these…

Taiwan bans DeepSeek AI and Meta warns its insider threats

Taiwan bans DeepSeek Chatbot of China Taiwan has officially imposed a ban on the use of DeepSeek, an AI-powered chatbot developed by a Chinese startup, within government organizations and entities responsible for critical infrastructure. However, the restriction does not extend…

AMD fixed a flaw that allowed to load malicious microcode

AMD released security patches to fix a flaw that could bypass SEV protection, letting attackers load malicious microcode. Researchers from Google disclosed an improper signature verification vulnerability, tracked as CVE-2024-56161 (CVSS score of 7.2), in AMD’s Secure Encrypted Virtualization (SEV). An…

Schneider Electric Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580 PLCs, BMENOR2200H and EVLink Pro AC Vulnerability: Incorrect Calculation of Buffer Size 2. RISK EVALUATION Successful exploitation of this vulnerability could…

AutomationDirect C-more EA9 HMI

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: C-more EA9 HMI Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow…

Schneider Electric Pro-face GP-Pro EX and Remote HMI

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 6.1 ATTENTION: Exploitable remotely Vendor: Schneider Electric Equipment: Pro-face GP-Pro EX and Remote HMI Vulnerability: Improper Enforcement of Message Integrity During Transmission in a Communication Channel 2. RISK EVALUATION Successful exploitation of this…