Vulnerability Summary for the Week of August 19, 2024

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info Patch Info Liquid Web--GiveWP  Deserialization of Untrusted Data vulnerability in Liquid Web GiveWP allows Object Injection.This issue affects GiveWP:…

Comments Off on Vulnerability Summary for the Week of August 19, 2024

Best Practices for Event Logging and Threat Detection

Executive Summary This publication defines a baseline for event logging best practices to mitigate cyber threats. It was developed by the Australian Signals Directorate’s Australian Cyber Security Centre (ASD’s ACSC)…

Comments Off on Best Practices for Event Logging and Threat Detection

Vulnerability Summary for the Week of August 12, 2024

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source & Patch Info 10Web Form Builder Team--Form Maker by 10Web  Improper Neutralization of Input During Web Page Generation (XSS or…

Comments Off on Vulnerability Summary for the Week of August 12, 2024

CISA Releases Ten Industrial Control Systems Advisories

CISA released ten Industrial Control Systems (ICS) advisories on August 13, 2024. These advisories provide timely information about current security issues, vulnerabilities, and exploits surrounding ICS. ICSA-24-226-01 AVEVA SuiteLink Server…

Comments Off on CISA Releases Ten Industrial Control Systems Advisories

Microsoft Releases August 2024 Security Updates

Microsoft released security updates to address vulnerabilities in multiple products. A cyber threat actor could exploit some of these vulnerabilities to take control of an affected system. CISA encourages users…

Comments Off on Microsoft Releases August 2024 Security Updates

Vulnerability Summary for the Week of August 5, 2024

High Vulnerabilities PrimaryVendor -- Product Description Published CVSS Score Source Info Patch Info 10web--Slider by 10Web Responsive Image Slider  The Slider by 10Web - Responsive Image Slider plugin for WordPress…

Comments Off on Vulnerability Summary for the Week of August 5, 2024

Best Practices for Cisco Device Configuration

In recent incidents, CISA has seen malicious cyber actors acquire system configuration files by leveraging available protocols or software on devices, such as abusing the legacy Cisco Smart Install feature.…

Comments Off on Best Practices for Cisco Device Configuration