Episode 99: SolarWinds Supply Chain Attack Affects Government and Fortune 500 Businesses

Earlier this week, we learned that SolarWinds, the largest provider of network management tools for government and enterprise organizations fell victim to a supply chain attack. This attack affected their Orion network management system. Reportedly, 18,000 enterprise and government customers installed malware that was digitally signed by a valid certificate as part of an update […] More info: https://www.wordfence.com/blog/2020/12/episode-99-solarwinds-supply-chain-attack-affects-government-and-fortune-500-businesses/

Mostly Unrecognized immense scale of Solarwinds Hack

I’m pretty confused as to why there is so little written in the mainstream news on the scale and implications of this latest, one of many attacks on our network infrastructure by a state actor. Maybe it’s just not being … More info: https://300m.com/security/mostly-unrecognized-immense-scale-of-solarwinds-hack/

Mostly Unrecognized immense scale of Solarwinds Hack

I’m pretty confused as to why there is so little written in the mainstream news on the scale and implications of this latest, one of many attacks on our network infrastructure by a state actor. Maybe it’s just not being … More info: https://300m.com/security/mostly-unrecognized-immense-scale-of-solarwinds-hack/

QEMU 4.0 vulnerability CVE-2019-12155

QEMU 4.0 vulnerability CVE-2019-12155 Security Advisory Security Advisory Description interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference. (CVE-2019-12155) More info: https://support.f5.com/csp/article/K75042242?utm_source=f5support&utm_medium=RSS

QEMU 4.0 vulnerability CVE-2019-12155

QEMU 4.0 vulnerability CVE-2019-12155 Security Advisory Security Advisory Description interface_release_resource in hw/display/qxl.c in QEMU 4.0.0 has a NULL pointer dereference. (CVE-2019-12155) More info: https://support.f5.com/csp/article/K75042242?utm_source=f5support&utm_medium=RSS

QEMU 3.0.0 heap-based buffer overflow CVE-2019-6778

QEMU 3.0.0 heap-based buffer overflow CVE-2019-6778 Security Advisory Security Advisory Description In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow. (CVE-2019-6778) Impact More info: https://support.f5.com/csp/article/K17520069?utm_source=f5support&utm_medium=RSS

QEMU 3.0.0 heap-based buffer overflow CVE-2019-6778

QEMU 3.0.0 heap-based buffer overflow CVE-2019-6778 Security Advisory Security Advisory Description In QEMU 3.0.0, tcp_emu in slirp/tcp_subr.c has a heap-based buffer overflow. (CVE-2019-6778) Impact More info: https://support.f5.com/csp/article/K17520069?utm_source=f5support&utm_medium=RSS

QEMU 4.2.0 buffer overflow vulnerability CVE-2020-8608

QEMU 4.2.0 buffer overflow vulnerability CVE-2020-8608 Security Advisory Security Advisory Description In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading ... More info: https://support.f5.com/csp/article/K81258141?utm_source=f5support&utm_medium=RSS

QEMU 4.2.0 buffer overflow vulnerability CVE-2020-8608

QEMU 4.2.0 buffer overflow vulnerability CVE-2020-8608 Security Advisory Security Advisory Description In libslirp 4.1.0, as used in QEMU 4.2.0, tcp_subr.c misuses snprintf return values, leading ... More info: https://support.f5.com/csp/article/K81258141?utm_source=f5support&utm_medium=RSS
Translate »