Month: October 2024

Proof-of-concept exploit code is now public for a vulnerability in Microsoft’s Remote Registry client that could be used to take control of a Windows domain by downgrading the security of the authentication process. The vulnerability is tracked as CVE-2024-43532 and takes advantage of a fallback mechanism in the Windows Registry (WinReg) client implementation that relies on old transport protocols…

Read More

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog…

Read More

In an interview with CRN, the Mandiant founder discusses joining the board at Expel and why he believes GenAI is ‘going to help the defender more.’ When it comes to generative AI, cybersecurity luminary Kevin Mandia believes the technology will end up as a bigger asset to cyber defense teams than hackers—even though the benefits…

Read More

Dan Adamany, founder and CEO of channel partner juggernaut Ahead, explains how he successfully grew his company into a $4 billion IT superstar thanks, in part, to Ahead’s successful acquisition strategy over the past five years. Ahead’s founder and innovative CEO, Dan Adamany, knows what it takes to not only acquire a company, but successfully…

Read More

Verizon CEO Hans Vestberg mentioned the pending $20 billion megadeal to acquire Frontier Communications and its recently acquired spectrum from U.S Cellular as part of its plan for fixed wireless, 5G and private networking domination during the company’s third-quarter 2024 earnings and broadband update call Tuesday. Verizon is relying on its strong “foundation” of a…

Read More

Oct 22, 2024Ravie LakshmananDocker Security / Cloud Security Bad actors have been observed targeting Docker remote API servers to deploy the SRBMiner crypto miner on compromised instances, according to new findings from Trend Micro. “In this attack, the threat actor used the gRPC protocol over h2c to evade security solutions and execute their crypto mining…

Read More

CISA released one Industrial Control Systems (ICS) advisory on October 22, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review newly released ICS advisories for technical details and mitigations. Source link lol

Read More

‘The DACH region, with its high GDP and untapped potential, is the next logical step. We’ve been successful in North America by delivering a high-touch, relationship-driven approach and we believe that will resonate in Germany as well,’ says Climb CEO Dale Foster. Climb Channel Solutions has pushed further into the European market with a focused…

Read More

Oct 22, 2024Ravie LakshmananVulnerability / Software Security Details have emerged about a now-patched security flaw in Styra’s Open Policy Agent (OPA) that, if successfully exploited, could have led to leakage of New Technology LAN Manager (NTLM) hashes. “The vulnerability could have allowed an attacker to leak the NTLM credentials of the OPA server’s local user…

Read More

VMware has released another security update for CVE-2024-38812, a critical VMware vCenter Server remote code execution vulnerability that was not correctly fixed in the first patch from September 2024. The flaw is rated critical (CVSS v3.1 score: 9.8) and stems from a heap overflow weakness in vCenter’s DCE/RPC protocol implementation, impacting the vCenter Server and…

Read More