Data Security
Vulnerabilities CVE-2024-12510 and CVE-2024-12511 have been discovered in Xerox VersaLink multifunction printers. Identified by Rapid7, these flaws allow attackers to retrieve authentication credentials via pass-back attacks on LDAP and SMB/FTP services. This could let an attacker with admin access capture LDAP credentials by directing the
In the rapidly evolving landscape of cybersecurity, a new threat has emerged that is testing the limits of current defense mechanisms. A Remote Access Trojan (RAT) named Sakura, recently published on GitHub, is causing significant concern within the security community due to its advanced evasion capabilities and comprehensive system control
Recent revelations have exposed serious vulnerabilities in Splunk Enterprise and the Splunk Cloud Platform, posing significant risks to user security. Splunk, a leader in data analytics and monitoring solutions, has issued critical patches to address these vulnerabilities. The potential impact of these issues, as well as the necessary actions for
A newly disclosed vulnerability named ImageRunner, uncovered by Tenable Research, exposed a subtle yet powerful privilege escalation pathway in Google Cloud Platform's Cloud Run service. This vulnerability, now patched by Google, allowed attackers with minimal permissions to illegitimately access and deploy private container images, effectively
In a rapidly advancing technological landscape, the need for faster and more efficient data transmission is more critical than ever. To address this, Keysight Technologies, NTT Innovative Devices Corporation, and Lumentum Holdings Inc. have jointly achieved a groundbreaking feat in high-speed data transmission, essential for the burgeoning field