Tag: EN

Proofpoint to Acquire Data Security Posture Management Firm Normalyze

Enterprise cybersecurity giant Proofpoint is acquiring data security posture management (DSPM) company Normalyze.  The post Proofpoint to Acquire Data Security Posture Management Firm Normalyze appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article: Proofpoint…

Amazon Identified Internet domains Exploited by Russian APT29

  The leading advanced persistent threat group in Russia has been phishing thousands of targets in businesses, government agencies, and military institutions.  APT29 (also known as Midnight Blizzard, Nobelium, and Cozy Bear) is one of the world’s most prominent threat…

Prometei Botnet: The Persistent Threat Targeting Global Systems

  The Prometei botnet, active since at least 2016, continues to pose a persistent threat worldwide by exploiting unpatched software vulnerabilities. First identified in 2020, Prometei has since infected over 10,000 systems across diverse regions, including Brazil, Indonesia, Turkey, and…

CISA Releases Three Industrial Control Systems Advisories

CISA released three Industrial Control Systems (ICS) advisories on October 29, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-303-01 Siemens InterMesh Subscriber Devices ICSA-24-303-02 Solar-Log Base 15 ICSA-24-303-03 Delta Electronics InfraSuite Device…

Siemens InterMesh Subscriber Devices

As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens’ ProductCERT Security Advisories (CERT Services | Services…

Delta Electronics InfraSuite Device Master

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Delta Electronics Equipment: InfraSuite Device Master Vulnerability: Deserialization of Untrusted Data 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an unauthenticated attacker to remotely…

Solar-Log Base 15

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 5.1 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Solar-Log Equipment: Base 15 Vulnerability: Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’) 2. RISK EVALUATION Successful exploitation of this vulnerability…

DigiCert – It’s a Matter of Trust

Starlink encountered a high-profile outage in April that caused service to go down for several hours. The reason was an expired digital certificate. Digital certificates have emerged as the currency of digital trust in the hyper-connected world of today. These…

Why safeguarding sensitive data is so crucial

A data breach at virtual medical provider Confidant Health lays bare the vast difference between personally identifiable information (PII) on the one hand and sensitive data on the other. The story began when security researcher Jeremiah Fowler discovered an unsecured…

Revolutionizing Dairy Farming with Digital Solutions

Cisco, in collaboration with its partners Rhône Élevage, NXO, and Ineso, has developed an innovative solution for dairy farmers to address the challenges posed by rising temperatures due to climate change. This solution has the potential to benefit not only…

RedLine and Meta Infostealers Disrupted by Law Enforcement

Authorities announce server shutdowns, domain seizures, and arrests in RedLine and Meta infostealers takedown operation. The post RedLine and Meta Infostealers Disrupted by Law Enforcement appeared first on SecurityWeek. This article has been indexed from SecurityWeek Read the original article:…