Article: AA21-048A: AppleJeus: Analysis of North Korea’s Cryptocurrency Malware - published almost 4 years ago. Content: https://us-cert.cisa.gov/ncas/alerts/aa21-048a Published: 2021 02 17 16:00:00 Received: 2021 06 06 09:03:33 Feed: US-CERT Technical Cyber Security Alerts Source: US-CERT Technical Cyber Security Alerts Category: Alerts Topic: Vulnerabilities |
Article: Mitigating Memory Safety Issues in Open Source Software - published almost 4 years ago. Content: Posted by Dan Lorenc, Infrastructure Security TeamMemory-safety vulnerabilities have dominated the security field for years and often lead to issues that can be exploited to take over entire systems. A recent study found that "~70% of the vulnerabilities addressed through a security update each year continue to be memory safety issues.” Another analysis on s... http://security.googleblog.com/2021/02/mitigating-memory-safety-issues-in-open.html Published: 2021 02 17 14:00:00 Received: 2021 06 06 09:04:48 Feed: Google Online Security Blog Source: Google Online Security Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part Two) - published almost 4 years ago. Content: In this post, we continue our analysis of the SolarCity ConnectPort X2e Zigbee device (referred to throughout as X2e device). In Part One, we discussed the X2e at a high level, performed initial network-based attacks, then discussed the hardware techniques used to gain a remote shell on the X2e device as a non-privileged system user. In this se... http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-two.html Published: 2021 02 17 13:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
Article: Shining a Light on SolarCity: Practical Exploitation of the X2e IoT Device (Part One) - published almost 4 years ago. Content: In 2019, Mandiant’s Red Team discovered a series of vulnerabilities present within Digi International’s ConnectPort X2e device, which allows for remote code execution as a privileged user. Specifically, Mandiant’s research focused on SolarCity’s (now owned by Tesla) rebranded ConnectPort X2e device, which is used in residential solar installations.... http://www.fireeye.com/blog/threat-research/2021/02/solarcity-exploitation-of-x2e-iot-device-part-one.html Published: 2021 02 17 13:00:00 Received: 2021 06 06 09:05:11 Feed: FireEye Blog Source: FireEye Blog Category: Cyber Security Topic: Cyber Security |
|
Article: Building Web Check using PaaS - published almost 4 years ago. Content: https://www.ncsc.gov.uk/blog-post/building-web-check-using-paas Published: 2021 02 17 08:09:16 Received: 2024 05 09 11:23:27 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
|
Article: Better device configuration shouldn’t be like herding cats - published almost 4 years ago. Content: httpss://www.ncsc.gov.uk/blog-post/better-device-configuration-should-not-be-like-herding-cats Published: 2021 02 17 08:09:16 Received: 2024 03 06 17:21:23 Feed: NCSC – All Feeds Source: National Cyber Security Centre (NCSC) Category: All Topic: Cyber Security |
Click to Open Code Editor