The Latest in IT Security

Posts Tagged ‘vulnerabilities’

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has released a joint Cybersecurity Advisory (CSA), with the National Security Agency (NSA) and the Federal Bureau of Investigation (FBI), detailing the top Common Vulnerabilities and Exposures (CVEs) exploited by Chinese state-sponsored threat actors since 2020. CISA says that Chinese threat actors continue to exploit known vulnerabilities […]

Read more ...

Among the presentations at this August’s Black Hat 2022 conference, few were of practical use to system administrators and security officers. A welcome exception was the report by Rapid7 researcher, Jacob Baines, who spoke in detail about how he’d analyzed Cisco enterprise software and found multiple vulnerabilities therein. Jacob’s findings are available as slides, in […]

Read more ...

A type of memory corruption bugs, use-after-free issues occur when a program does not clear the pointer after freeing memory allocation. These flaws could lead to arbitrary code execution, data corruption, or denial of service. Use-after-free vulnerabilities may also be combined with other security flaws, leading to complete system compromise. The exploitation of use-after-free issues […]

Read more ...


Categories

FRIDAY, APRIL 18, 2025
WHITE PAPERS

Mission-Critical Broadband – Why Governments Should Partner with Commercial Operators:
Many governments embrace mobile network operator (MNO) networks as ...

ARA at Scale: How to Choose a Solution That Grows With Your Needs:
Application release automation (ARA) tools enable best practices in...

The Multi-Model Database:
Part of the “new normal” where data and cloud applications are ...

Featured

Archives

Latest Comments