Researchers Identify Principles to Reduce Noise in Network Intrusion Detection Systems in SOC
A group of researchers from Eindhoven University of Technology has unveiled a new findings that could significantly improve the efficiency of Security Operations Centers (SOCs) worldwide.
The study, set to be presented at the...
Active Directory Group Policy Bypassed To Allow NTLMv1 Authentications
Silverfort's cybersecurity research team has uncovered a significant flaw in Microsoft's Active Directory Group Policy that allows NTLMv1 authentication to persist despite being ostensibly disabled.
This discovery highlights a critical vulnerability where misconfigured on-premises applications...
Kerio Control Firewall Vulnerability Allows 1-Click Remote Code Execution
A critical vulnerability in Kerio Control, a popular firewall and Unified Threat Management (UTM) product, has been discovered that could allow attackers to execute remote code with a single click.
The flaw, identified as CVE-2024-52875,...
ASUS Routers Vulnerabilities Allows Arbitrary Code Execution
ASUS, a leading networking equipment manufacturer, has issued a critical security advisory for several router models.
The company has identified injection and execution vulnerabilities in certain firmware series that could allow authenticated attackers to trigger...
Siemens UMC Vulnerability Let Remote Attacker Execute Arbitrary Code
A critical security flaw has been discovered in Siemens' User Management Component (UMC), potentially exposing numerous industrial control systems to remote attacks.
The vulnerability, identified as CVE-2024-49775, allows unauthenticated, remote attackers to execute arbitrary...
Critical Dell Product Vulnerabilities Let Attackers Compromise Affected Systems
Dell has recently disclosed two critical security vulnerabilities affecting a wide range of its products, potentially exposing numerous systems to serious risks.
The vulnerabilities, identified as CVE-2024-37143 and CVE-2024-37144, impact various versions of Dell PowerFlex...
SAP NetWeaver Vulnerabilities Let Attackers Upload Malicious PDF Files
SAP has issued a crucial security update addressing multiple high-severity vulnerabilities in its NetWeaver Application Server for Java, specifically within the Adobe Document Services component.
The patch, released on December 10, 2024, as part...
Hackers Exploited Windows Event Logging Tool To Steal Data Secretly
Wevtutil.exe, a Windows event log utility, can be used maliciously in Living Off the Land (LOLBAS) to export logs for exfiltration, query specific event data, or clear logs.
Attackers increasingly use Living Off the Land...
Critical MediaTek Bluetooth Chipset Vulnerabilities Impacted 1.5 Billion+ Android Users
A series of security vulnerabilities have been identified in MediaTek chipsets, affecting several Android versions and other related software platforms.
MediaTek leads the market in powering Android tablets and smart-feature phones and ranks as...
North Korean Hacking Group Launches Undected Malwareless URL Phishing Attacks
Researchers from South Korea have discovered that the notorious North Korean hacking group, known as Kimsuky, has adapted its phishing tactics to use malwareless phishing attack tactics, which evade major EDR detection.
The group, which...