-
Ivanti waarschuwt voor kritieke path traversal-lekken in Endpoint Manager
Ivanti waarschuwt voor kritieke path traversal-lekken in Endpoint Manager Softwarebedrijf Ivanti waarschuwt klanten voor kritieke path traversal-kwetsbaarheden in Ivanti Endpoint Manager waardoor een ongeauthenticeerde aanvaller op afstand gevoelige informatie van organisat … Read more Published Date: Jan 15, 2025 (5 hours, 8 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-13161 CVE-2024-13160 CVE-2024-13159 CVE-2024-10811 Go to…
-
CISA Launches AI Cybersecurity Playbook to Strengthen Collective Defense
CISA Launches AI Cybersecurity Playbook to Strengthen Collective Defense The Cybersecurity and Infrastructure Security Agency (CISA) has unveiled a new tool aimed at strengthening the cybersecurity resilience of AI systems. The AI Cybersecurity Collaboration Playbook, deve … Read more Published Date: Jan 15, 2025 (5 hours, 26 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-5910…
-
Kwetsbaarheden Windows Hyper-V NT Kernel Integration VSP actief misbruikt
Kwetsbaarheden Windows Hyper-V NT Kernel Integration VSP actief misbruikt Drie kwetsbaarheden in Windows Hyper-V NT Kernel Integration VSP zijn actief misbruikt bij aanvallen, zo laat Microsoft weten, dat tevens beveiligingsupdates heeft uitgebracht om de problemen te verhe … Read more Published Date: Jan 15, 2025 (5 hours, 49 minutes ago) Vulnerabilities has been mentioned in this article.…
-
January 2025 Patch Tuesday: 10 Critical Vulnerabilities and Eight Zero-Days Among 159 CVEs
January 2025 Patch Tuesday: 10 Critical Vulnerabilities and Eight Zero-Days Among 159 CVEs Microsoft has released security updates for 159 vulnerabilities in its January 2025 Patch Tuesday rollout. Among these are 10 Critical vulnerabilities and eight zero-days affecting the Windows Hyper-V … Read more Published Date: Jan 15, 2025 (5 hours, 55 minutes ago) Vulnerabilities has been…
-
CISA adds Fortinet flaw CVE-2024-55591 to KEV Catalog
CISA adds Fortinet flaw CVE-2024-55591 to KEV Catalog CVE-2024-55591 is a critical vulnerability affecting Fortinet’s FortiOS and FortiProxy devices. This vulnerability allows a remote attacker to bypass authentication mechanisms and gain super-admin pri … Read more Published Date: Jan 15, 2025 (6 hours, 13 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2024-55591 CVE-2024-12398 CVE-2024-12847 CVE-2024-5594…
-
CVE-2023-37936 (CVSS 9.6): Urgent Patch Needed for FortiSwitch Vulnerability
CVE-2023-37936 (CVSS 9.6): Urgent Patch Needed for FortiSwitch Vulnerability Fortinet has issued patches to address a critical security vulnerability (CVE-2023-37936, CVSS 9.6) affecting its FortiSwitch product line. The vulnerability could allow remote, unauthenticated attack … Read more Published Date: Jan 15, 2025 (6 hours, 20 minutes ago) Vulnerabilities has been mentioned in this article. CVE-2023-37936 CVE-2023-34992 Go…
-
Simplify AI Development with the Model Context Protocol and Docker
This ongoing Docker Labs GenAI series explores the exciting space of AI developer tools. At Docker, we believe there is a vast scope to explore, openly and without the hype. We will share our explorations and collaborate with the developer community in real time. Although developers have adopted autocomplete tooling like GitHub Copilot and use…
-
Undercover Operations: Scraping the Cybercrime Underground
A blog about web scraping methods, use cases, challenges, and how to overcome them. Read More
-
A first look at iOS 18 forensics
This has been a tough year for me: my mom passed away in June, and I’m still slowly recovering from the hard blow. It’s time to start again doing what I love: researching and sharing! It’s early September and like every year, that moment is approaching when everyone who deals with mobile forensics starts to…
-
Dissecting the Android WiFiConfigStore.xml for forensic analysis
A smartphone is often connected to a Wi-Fi network: think of how much time we spend at home, in our office, or even in a public place while studying or exercising. As soon as we can reach a (hopefully trusted) Wi-Fi network, we connect to it! On Android devices, the Wi-Fi connection is managed by…