CVE-2021-34392
Trusty TLK contains a vulnerability in the NVIDIA TLK kernel where an integer overflow in the tz_map_shared_mem function can bypass boundary checks, which might lead to denial of service.
FBI Agents Secretly Deleted Web Shells From Hacked Microsoft Exchange Servers | IT Security News 14. April 2021 FBI agents executed a court-authorized cyber operation to delete malicious web shells from hundreds of previously hacked Microsoft Exchange servers in the United States, unbeknownst to their owners, the U.S. Department of Justice (DoJ) said Tuesday. Like…
Governance & Risk Management , IT Risk Management , Security Operations Opening RSA Conference Keynote Speeches Highlight Tactics for Sustainable Resiliency Mathew J. Schwartz (euroinfosec) • May 17, 2021 Could the theme of this year’s RSA Conference be anything other than resiliency? See Also: Webinar | Software Security: Prescriptive vs. Descriptive …
Zscaler has agreed to purchase startup Trustdome and its technology that’s used to get control over who and what has access to data, applications, and services in public cloud environments. The cloud security vendor said Ramat Gan, Israel-based Trustdome’s Cloud Infrastructure Entitlement Management (CIEM) platform will help businesses reduce their public cloud attack surface and…
Security researchers from Eclypsium have discovered a total of four vulnerabilities in Dell’s SupportAssist software. As the software is pre-installed on the majority of Dell machines running Windows, millions of systems are at risk of remote attack. Eclypsium says that a total of 129 Dell models are affected by the security issues. The chain of…
Google recently removed 8 apps that were masquerading as cryptocurrency cloud mining applications from its Play Store. This comes as the demand for cryptocurrency mining has been increasing day by day, also attracting malicious activities from several places. The 8 apps banned on Google Playstore are: BitFunds – Crypto Cloud MiningBitcoin Miner – Cloud MiningBitcoin…
Executive Summary Informations Name CVE-2021-2293 First vendor Publication 2021-04-22 Vendor Cve Last vendor Modification 2021-04-22 Security-Database Scoring CVSS v3 Cvss vector : CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H Overall CVSS Score 4.9 Base Score 4.9 Environmental Score 4.9 impact SubScore 3.6 Temporal Score 4.9 Exploitabality Sub Score 1.2 Attack Vector Network Attack Complexity Low Privileges Required High User Interaction…