Category: EN

HPE Aruba Vulnerabilities: Prevent Systems From RCE Attacks

Recently, HPE Aruba Networking, formerly known as Aruba Networks, has encountered significant security challenges. Vulnerabilities in their ArubaOS, the proprietary network operating system, have been identified, posing serious risks, including remote code execution (RCE). In this article, we delve into…

Hardware Level Vulnerabilities, Revisited

In August of last year, I examined several CPU bugs that posed serious security threats. The mitigations for these vulnerabilities generally involved either incorporating additional instructions or opting for alternative CPU instructions – strategies that lead to diminished system performance…

CISA and FBI Issue Alert on Path Traversal Vulnerabilities

The joint alert from CISA and FBI highlights the continued exploitation of path traversal vulnerabilities in critical infrastructure attacks, impacting sectors like healthcare. The recent CVE-2024-1708 vulnerability in ConnectWise ScreenConnect is a prime example. This flaw was exploited alongside another…

The Importance of Passive Asset Discovery

It’s the fifth requirement in CIS Control 1 : Use a passive asset discovery tool. Sounds simple enough. But what does it mean? And what, specifically, makes it so important that it became one of the first five requirements of…

Facing down the triple threat

The Register’s Tim Philips gets down and dirty on cyber security in this interview with Rubrik CISO Richard Cassidy Sponsored Post  There were hard words about the state of Britain’s cyber security in parliament recently, but it’s not just the…

Black Basta Ransomware Victim Count Tops 500

Affiliates of prolific Black Basta ransomware group have breached over 500 global organizations This article has been indexed from www.infosecurity-magazine.com Read the original article: Black Basta Ransomware Victim Count Tops 500

Welcome to the Laser Wars

Amid a rising tide of adversary drones and missile attacks, laser weapons are finally poised to enter the battlefield. This article has been indexed from Security Latest Read the original article: Welcome to the Laser Wars

Malicious Go Binary Delivered via Steganography in PyPI

The malicious package, called “requests-darwin-lite”, was a fork of the popular “requests” Python package. The attacker used the cmdclass feature in the setup.py file to customize the package installation process. This article has been indexed from Cyware News – Latest…