Security Bulletin
30 Jan 2025
Biztonsági szemle
CISA Releases Fact Sheet Detailing Embedded Backdoor Function of Contec CMS8000 Firmware
CISA released a fact sheet, Contec CMS8000 Contains a Backdoor, detailing an analysis of three firmware package versions of the Contec CMS8000, a patient monitor used by the U.S. Healthcare and Public Health (HPH) sector. Analysts discovered that an...
30 Jan 2025
Biztonsági szemle
Rockwell Automation FactoryTalk AssetCentre
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk AssetCentre Vulnerabilities: Inadequate Encryption Strength, Insufficiently Protected Credentials 2...
30 Jan 2025
Biztonsági szemle
Rockwell Automation KEPServer
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: KEPServer Vulnerability: Uncontrolled Resource Consumption 2. RISK EVALUATION Successful exploitation of this...
30 Jan 2025
Biztonsági szemle
Contec Health CMS8000 Patient Monitor
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Contec Health Equipment: CMS8000 Patient Monitor Vulnerabilities: Out-of-bounds Write, Hidden Functionality (Backdoor), Privacy Leakage 2. RISK...
30 Jan 2025
Biztonsági szemle
Schneider Electric System Monitor Application in Harmony and Pro-face PS5000 Legacy Industrial PCs
View CSAF 1. EXECUTIVE SUMMARY CVSS v3 9.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Harmony Industrial PC, Pro-face Industrial PC Vulnerability: Exposure of Sensitive Information to an Unauthorized...

30 Jan 2025
Biztonsági szemle
Fake Videos of Former First Lady Scam Namibians
Amateurish financial scams are common across Africa, and Namibia's influential former first lady, Monica Geingos, has emerged as a particularly effective host body for these messages.

30 Jan 2025
Biztonsági szemle
ISC Stormcast For Thursday, January 30th, 2025 https://isc.sans.edu/podcastdetail/9302, (Thu, Jan 30th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.

30 Jan 2025
Biztonsági szemle
UK agency floats plan to overhaul vulnerability classifications
The UK’s cybersecurity regulator has pitched a plan that would see the elimination of vulnerability ratings.

30 Jan 2025
Biztonsági szemle
Lynx ransomware infiltration reveals affiliate panel details
Group-IB researchers uncovered a structured affiliate workflow and “all-in-one” RaaS with multiple encryption modes.

29 Jan 2025
Biztonsági szemle
Minutes are miles: Why automatic rollbacks are too slow to protect you
When it comes to cyber threats, protection is better than response.

29 Jan 2025
Biztonsági szemle
PrintNightmare Aftermath: Windows Print Spooler Is Better. What's Next?
While Microsoft has boosted the security of Windows Print Spooler in the three years since the disclosure of the PrintNightmare vulnerability, the service remains a spooky threat that organizations cannot afford to ignore.

29 Jan 2025
Biztonsági szemle
The CISO Role Elevates, Boosts, Rises, and Evolves - BSW #380
Pagination
- Previous page ‹‹
- Page 312
- Next page ››