Author: nlqip

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities established the Known Exploited Vulnerabilities Catalog…

Read More

Juniper Networks released a security bulletin to address a vulnerability in Junos OS: SRX Series. A cyber threat actor could exploit this vulnerability to cause a denial-of-service condition.  Users and administrators are encouraged to review the following and apply the necessary updates: Source link lol

Read More

From handshake deals to digital pat-downs, the rental market is filled with great opportunities (that is, for scammers). Our very own producer, Andrew Steven recently got some first-hand experience when he and his partner tried to find a new place.  We talked to real estate professionals–one rents a cottage, another has a slightly bigger portfolio…

Read More

CISA released seven Industrial Control Systems (ICS) advisories on July 2, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. CISA encourages users and administrators to review the newly released ICS advisories for technical details and mitigations. Source link lol

Read More

CRN rounds up the 10 hottest IoT startups of 2024 so far, which range from Artisight and AssetWatch to TXOne Networks and Xage Security. While the Internet of Things may have lost its sheen as a top buzzword to the tech world’s fevered discussions around generative AI, there remains ample opportunity for companies to grow…

Read More

First, the agents were able to discover new vulnerabilities in a test environment — but that doesn’t mean that they can find all kinds of vulnerabilities in all kinds of environments. In the simulations that the researchers ran, the AI agents were basically shooting fish in a barrel. These might have been new species of…

Read More

Multiple owners of Google Pixel 6 series phones (6, 6a, 6 Pro) have been reporting in the past week that their devices were “bricked” after they performed a factory reset. Factory resets wipe the device of all personal data, apps, and settings and are typically performed when the device owner prepares it for resale. The Pixel…

Read More

Google Chrome is set to prevent the use of SSL certificates issued by Entrust. Google Chrome specifically blocks SSL certificates issued by Entrust starting from November 2024. This news shows the importance of certificate security compliance and customers’ digital privacy, which a Certificate Authority must understand. Google announced that all SSL certificates from Entrust will…

Read More

Based on the origin of the analyzed samples, the research concluded that the campaign is mostly targeting the US, Germany, and Russia. Malware nest for maximum impact “In this campaign, our threat intelligence team has observed what seems to be an obvious course to follow when trying to maximize benefit in a malware distribution campaign,”…

Read More

Public Surveillance of Bars This article about an app that lets people remotely view bars to see if they’re crowded or not is filled with commentary—on both sides—about privacy and openness. Tags: privacy, surveillance Posted on July 2, 2024 at 7:06 AM • 0 Comments Sidebar photo of Bruce Schneier by Joe MacInnis. Source link…

Read More