Google Releases Security Update for Chrome

Original release date: July 5, 2022Google has released Chrome version 103.0.5060.114 for Windows. This version addresses vulnerabilities that an attacker could exploit to take control of an affected system.  CISA…

Comments Off on Google Releases Security Update for Chrome

Vulnerability Summary for the Week of June 27, 2022

Original release date: July 4, 2022  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info codesys -- gateway In CODESYS Gateway Server V2 for versions…

Comments Off on Vulnerability Summary for the Week of June 27, 2022

AA22-181A: #StopRansomware: MedusaLocker

Original release date: June 30, 2022SummaryActions to take today to mitigate cyber threats from ransomware: • Prioritize remediating known exploited vulnerabilities. • Train users to recognize and report phishing attempts.…

Comments Off on AA22-181A: #StopRansomware: MedusaLocker

#StopRansomware: MedusaLocker

Original release date: June 30, 2022CISA, the Federal Bureau of Investigation (FBI), the Department of the Treasury (Treasury), and the Financial Crimes Enforcement Network (FinCEN) have released a joint Cybersecurity…

Comments Off on #StopRansomware: MedusaLocker

2022 CWE Top 25 Most Dangerous Software Weaknesses

Original release date: June 28, 2022The Homeland Security Systems Engineering and Development Institute, sponsored by CISA and operated by MITRE, has released the 2022 Common Weakness Enumeration (CWE) Top 25…

Comments Off on 2022 CWE Top 25 Most Dangerous Software Weaknesses

Vulnerability Summary for the Week of June 20, 2022

Original release date: June 27, 2022  High Vulnerabilities Primary Vendor -- Product Description Published CVSS Score Source & Patch Info There were no high vulnerabilities recorded this week. Back to…

Comments Off on Vulnerability Summary for the Week of June 20, 2022

CISA Adds Eight Known Exploited Vulnerabilities to Catalog  

Original release date: June 27, 2022CISA has added eight new vulnerabilities to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. These types of vulnerabilities are a frequent attack…

Comments Off on CISA Adds Eight Known Exploited Vulnerabilities to Catalog