Cyberveillecurated by Decio
Nuage de tags
Mur d'images
Quotidien
Flux RSS
  • Flux RSS
  • Daily Feed
  • Weekly Feed
  • Monthly Feed
Filtres

Liens par page

  • 20 links
  • 50 links
  • 100 links

Filtres

Untagged links
page 216 / 216
4310 résultats taggé E*N  ✕
Operation EmailThief: Active Exploitation of Zero-day XSS Vulnerability in Zimbra https://www.volexity.com/blog/2022/02/03/operation-emailthief-active-exploitation-of-zero-day-xss-vulnerability-in-zimbra/
13/02/2022 01:37:20
QRCode
archive.org
thumbnail
Volexity EN Zimbra 0-day TEMP_Heretic
PwnKit: Local Privilege Escalation Vulnerability Discovered in polkit’s pkexec (CVE-2021-4034) https://blog.qualys.com/vulnerabilities-threat-research/2022/01/25/pwnkit-local-privilege-escalation-vulnerability-discovered-in-polkits-pkexec-cve-2021-4034
13/02/2022 01:35:15
QRCode
archive.org
thumbnail

The Qualys Research Team has discovered a memory corruption vulnerability in polkit's pkexec, a SUID-root program that is installed by default on every major…

Qualys EN PwnKit Linux CVE-2021-4034 polkit pkexec
Helping users stay safe: Blocking internet macros by default in Office https://techcommunity.microsoft.com/t5/microsoft-365-blog/helping-users-stay-safe-blocking-internet-macros-by-default-in/ba-p/3071805
13/02/2022 01:30:37
QRCode
archive.org
thumbnail

Changing Default Behavior

We’re introducing a default change for five Office apps that run macros:
VBA macros obtained from the internet will now be blocked by default.

Microsoft EN change macros Office VBA
Google Project Zero: Vendors are now quicker at fixing zero-days https://www.bleepingcomputer.com/news/security/gooject-zero-vendors-are-now-quicker-at-fixing-zero-days/ogle-pr
11/02/2022 18:52:36
QRCode
archive.org

Google's Project Zero has published a report showing that organizations took less time to address the zero-day vulnerabilities that the team reported last year.

googleprojectzero EN 0-day metrics bleepingcomputer
A walk through Project Zero metrics https://googleprojectzero.blogspot.com/2022/02/a-walk-through-project-zero-metrics.html
11/02/2022 18:47:14
QRCode
archive.org
thumbnail
  • In 2021, vendors took an average of 52 days to fix security vulnerabilities reported from Project Zero. This is a significant acceleration from an average of about 80 days 3 years ago.
  • In addition to the average now being well below the 90-day deadline, we have also seen a dropoff in vendors missing the deadline (or the additional 14-day grace period). In 2021, only one bug exceeded its fix deadline, though 14% of bugs required the grace period.
  • Differences in the amount of time it takes a vendor/product to ship a fix to users reflects their product design, development practices, update cadence, and general processes towards security reports. We hope that this comparison can showcase best practices, and encourage vendors to experiment with new policies.
  • This data aggregation and analysis is relatively new for Project Zero, but we hope to do it more in the future. We encourage all vendors to consider publishing aggregate data on their time-to-fix and time-to-patch for externally reported vulnerabilities, as well as more data sharing and transparency in general.
googleprojectzero metrics bug 0-day EN
UPnProxy: Eternal Silence https://www.akamai.com/blog/security/upnproxy-eternal-silence
11/02/2022 18:39:36
QRCode
archive.org

UPnProxy is alive and well. There are 277,000 devices, out of a pool of 3.5 million, running vulnerable implementations of UPnP. Of those, Akamai can confirm that more than 45,000 have been compromised in a widely distributed UPnP NAT injection campaign.

Akamai EN UPnProxy EternalSilence UPnP
FritzFrog: P2P Botnet Hops Back on the Scene https://www.akamai.com/blog/security/fritzfrog-p2p
11/02/2022 18:37:08
QRCode
archive.org

FritzFrog is a peer-to-peer botnet, which means its command and control server is not limited to a single, centralized machine, but rather can be done from every machine in its distributed network. In other words, every host running the malware process becomes part of the network, and is capable of sending, receiving, and executing the commands to control machines in the network.

FritzFrog botnet EN Akamai
CISA Adds One Known Exploited Vulnerability to Catalog https://www.cisa.gov/uscert/ncas/current-activity/2022/02/11/cisa-adds-one-known-exploited-vulnerability-catalog
11/02/2022 18:32:07
QRCode
archive.org

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence that threat actors are actively exploiting the vulnerability listed in the table below. These types of vulnerabilities are a frequent attack vector for malicious cyber actors of all types and pose significant risk to the federal enterprise.

uscert csirt CISA EN CVE-2022-22620
About the security content of macOS Monterey 12.2.1 https://support.apple.com/en-us/HT213092
11/02/2022 18:22:26
QRCode
archive.org

"This document describes the security content of macOS Monterey 12.2.1."

CVE-2022-22620 macOS apple EN AppleSupport
Apple Releases iOS, iPadOS, macOS Updates to Patch Actively Exploited Zero-Day Flaw https://thehackernews.com/2022/02/apple-releases-ios-ipados-macos-updates.html
11/02/2022 18:17:35
QRCode
archive.org

"Apple on Thursday released security updates for iOS, iPadOS, macOS, and Safari to address a new WebKit flaw that it said may have been actively exploited in the wild, making it the company's third zero-day patch since the start of the year."

CVE-2022-22620 iPadOs iOS macOS Safari EN
page 216 / 216
4898 links
Shaarli - Le gestionnaire de marque-pages personnel, minimaliste, et sans base de données par la communauté Shaarli - Theme by kalvn