Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 6, 2025

    Microsoft script updates bootable media for BlackLotus bootkit fixes

    Microsoft script updates bootable media for BlackLotus bootkit fixes Microsoft has released a PowerShell script to help Windows users and admins update bootable media so it utilizes the new “Windows UEFI CA 2023” certificate before the mitigations of the BlackLotus UEF … Read more Published Date: Feb 05, 2025 (21 hours, 6 minutes ago) Vulnerabilities has been mentioned in this…

    CVE, Cybersecurity, Cybersecurity awareness, Security, Threat Intelligence
    #cve, #cybersecurity, #security
  • February 6, 2025

    Cisco patches two critical Identity Services Engine flaws

    Cisco patches two critical Identity Services Engine flaws Cisco has fixed two critical vulnerabilities in its Identity Services Engine (ISE) that could allow an authenticated remote attacker to execute arbitrary commands as root or access sensitive informati … Read more Published Date: Feb 05, 2025 (21 hours, 50 minutes ago) Vulnerabilities has been mentioned in this article.…

    CVE, Cybersecurity, Cybersecurity awareness, Security, Threat Intelligence
    #cve, #cybersecurity, #security
  • February 6, 2025

    7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine

    7-Zip 0-day was exploited in Russia’s ongoing invasion of Ukraine Researchers said they recently discovered a zero-day vulnerability in the 7-Zip archiving utility that was actively exploited as part of Russia’s ongoing invasion of Ukraine. The vulnerability allowed … Read more Published Date: Feb 05, 2025 (23 hours, 17 minutes ago) Vulnerabilities has been mentioned in this…

    CVE, Cybersecurity, Cybersecurity awareness, Security, Threat Intelligence
    #cve, #cybersecurity, #security
  • February 6, 2025

    CISA orders agencies to patch Linux kernel bug exploited in attacks

    CISA orders agencies to patch Linux kernel bug exploited in attacks ​CISA has ordered federal agencies to secure their systems within three weeks against a high-severity Linux kernel flaw actively exploited in attacks. Tracked as CVE-2024-53104, the security bug was f … Read more Published Date: Feb 05, 2025 (1 day, 1 hour ago) Vulnerabilities has been…

    CVE, Cybersecurity, Cybersecurity awareness, Security, Threat Intelligence
    #cve, #cybersecurity, #security
  • February 6, 2025

    Cloudflare’s commitment to advancing Public Sector security worldwide by pursuing FedRAMP High, IRAP, and ENS

    Today, we announced our commitment to achieving the US Federal Risk and Authorization Management Program (FedRAMP) – High, Australian Infosec Registered Assessors Program (IRAP), and Spain’s Esquema Nacional de Seguridad (ENS) as part of Cloudflare for Government. As more and more essential services are being shifted to the Internet, ensuring that governments and regulated industries…

    General
  • February 6, 2025

    NIST Report to Congress Provides Update on Champlain Towers South Investigation

    The report notes that the team has completed all experimental work on the physical evidence from the building’s structural elements. Go to Source

    General
  • February 6, 2025

    No hallucinations here: track the latest AI trends with expanded insights on Cloudflare Radar

    During 2024’s Birthday Week, we launched an AI bot & crawler traffic graph on Cloudflare Radar that provides visibility into which bots and crawlers are the most aggressive and have the highest volume of requests, which crawl on a regular basis, and more. Today, we are launching a new dedicated “AI Insights” page on Cloudflare…

    General
  • February 6, 2025

    Preserving content provenance by integrating Content Credentials into Cloudflare Images

    Today, we are thrilled to announce the integration of the Coalition for Content Provenance and Authenticity (C2PA) provenance standard into Cloudflare Images. Content creators and publishers can seamlessly preserve the entire provenance chain — from how an image was created and by whom, to every subsequent edit — across the Cloudflare network. What is the…

    General
  • February 6, 2025

    Multiple Vulnerabilities in Google Android OS Could Allow for Privilege Escalation

    Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for privilege escalation. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for privilege escalation in the…

    General
  • February 6, 2025

    Code injection attacks using publicly disclosed ASP.NET machine keys

    In December 2024, Microsoft Threat Intelligence observed limited activity by an unattributed threat actor using a publicly available, static ASP.NET machine key to inject malicious code and deliver the Godzilla post-exploitation framework. In the course of investigating, remediating, and building protections against this activity, we observed an insecure practice whereby developers have incorporated various publicly…

    General
Previous Page
1 … 48 49 50 51 52 … 95
Next Page

Designed by Alireza Gharib