Remove 01
article thumbnail

CISA adds Stuxnet bug to its Known Exploited Vulnerabilities Catalog

Security Affairs

CVE-2013-6282 : Linux Kernel – The get_user and put_user API functions of the Linux kernel fail to validate the target address when being used on ARM v6k/v7 platforms. CVE-2013-2596 Linux Kernel – Linux kernel fb_mmap function in drivers/video/fbmem.c Code Aurora is used in third-party products such as Qualcomm and Android.

IT 97
article thumbnail

CISA urges to fix actively exploited Firefox zero-days by March 21

Security Affairs

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

CISA adds bugs exploited by commercial surveillance spyware to Known Exploited Vulnerabilities catalog

Security Affairs

The exploits were used to install commercial spyware and malicious apps on targets’ devices. Google TAG shared indicators of compromise (IoCs) for both campaigns.

article thumbnail

North Korea-linked Kimsuky used a new Linux backdoor in recent attacks

Security Affairs

Kimsuky cyberespionage group (aka Springtail, ARCHIPELAGO, Black Banshee, Thallium , Velvet Chollima, APT43 ) was first spotted by Kaspersky researcher in 2013. including: Operation Description 01 Pauses communication with the C&C server for an arbitrary time duration.

article thumbnail

Tracing the Supply Chain Attack on Android

Krebs on Security

jyhxz.net 2013-07-02 — longmen[.]com com 2013-10-09 ALIBABA CLOUD COMPUTING (BEIJING) CO., net 2014-01-20 ALIBABA CLOUD COMPUTING (BEIJING) CO., For the remainder of this post, we’ll focus on the bolded domain names below: Domain Name Create Date Registrar. 2333youxi[.]com blazefire[.]com blazefire[.]net

Cloud 252
article thumbnail

How 5G Operators Can Prepare for The Quantum Era

Thales Cloud Protection & Licensing

How 5G Operators Can Prepare for The Quantum Era madhav Tue, 01/30/2024 - 05:25 The Quantum State of Play in 5G Quantum computing has found theoretical application in modern computation systems, including cellular networks like 5G.

Risk 71
article thumbnail

CISA added 9 new flaws to the Known Exploited Vulnerabilities Catalog, including Magento e Chrome bugs

Security Affairs

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities , FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.