Decryptedtech Decryptedtech Decryptedtech Decryptedtech
  • Home
  • Articles
    • News
    • Security Talk
    • Game Thoughts
    • Editorials
    • Shows and Events
    • Leaks and Rumors
    • My Ramblings
    • In Other News
    • Bits, Bytes, and Bourbon
  • Consulting
    • Security Consulting
    • Why Us
    • Services
  • Privacy Policy
  • Archived Items
    • Reviews
      • Enthusiast Gear
        • Motherboards
        • CPUs
        • GPUs
        • Audio
        • Storage and Networking
        • Entusiast Peripherals
      • Pro Gear
        • Motherboards
        • Memory
        • Storage and Networking
      • Consumer Gear
        • Motherboards
        • Audio
        • Storage and Networking
        • Consumer Peripherals
      • Home Theater
      • Mobile Computing
      • Tech Unplugged
      • Gadgets
      • Systems
        • Pro Systems
      • Software and Games
        • Consumer Software
        • Games
      • Peripherals
      • Power and Cooling
  • Bits, Bytes, and Bourbon Store
Security Talk

New Report Shows WordPress Sites leave 30% of Critical Vulnerabilities Unpatched.

PatchStack has pushed out a report that shows that a shocking 30% of vulnerabilities in WordPress sites are left unpatched. This is not to say that people are not patching (they are not), but the report illustrates that vendors for plugins are not properly updating their own tools and software to address security issues. WordPress is one of the most popular content management systems available and has a very broad ecosystem of plug-ins, themes, and other bolt-on components to make it even more flexible and usable.
Details
By Sean Kalinich
Sean Kalinich
Mar 10
Hits: 1324
  • Security
  • Plugins
  • WordPress
  • Vulnerabilities
  • Vulnerability Management
  • patchshack
  • themes

Read more: New Report Shows WordPress Sites leave 30% of...

No comments on “New Report Shows WordPress Sites leave 30% of Critical Vulnerabilities Unpatched.”
Security Talk

Emotet’s Comeback Shows no Sign of Slowing as Bot Number Exceeds 100,000

Emotet, (not to be confused with Imhotep the ancient Egyptian Polymath) was originally identified in 2014 and quickly became one of the top threats of the decade. After an early start as a banking trojan, the group amassed a huge number of bots that it was able to leverage to execute attacks on targets. This bot infrastructure was then sold as a service to other groups as part of a malware-as-a-Service model. The prevalence and reach of Emotet was enough that in early 2021 the global law enforcement and cyber security community targeted Emotet’s infrastructure and people that had been identified as part of the group. It was a significant hit to the organization.

Details
By Sean Kalinich
Sean Kalinich
Mar 10
Hits: 1084
  • Security
  • Malware
  • emotet
  • trickbot
  • conti
  • malware as a service

Read more: Emotet’s Comeback Shows no Sign of Slowing as...

No comments on “Emotet’s Comeback Shows no Sign of Slowing as Bot Number Exceeds 100,000”
Security Talk

16 New Vulnerabilities Found in HP UEFI Firmware Implementations by Binarly

The Security Group Binarly has disclosed 16 high-severity vulnerabilities in different implementations of UEFI firmware in HP Enterprise devices. The list of affected devices includes Laptops, Desktops, POS (point-of-sale) and edge computing nodes. The vulnerabilities range in severity from 7.5 to 8.8 putting them square in the high-severity range. The discovery also may affect additional manufacturers via a reference code match that has led to AMD’s firmware driver (AgesaSmmSaveMemoryConfig). This AMD reference code means that some vulnerabilities may exist across the entire computing ecosystem.

Details
By Sean Kalinich
Sean Kalinich
Mar 09
Hits: 1622
  • Security
  • Malware
  • UEFI
  • Vulnerabilities
  • binarly

Read more: 16 New Vulnerabilities Found in HP UEFI Firmware...

No comments on “16 New Vulnerabilities Found in HP UEFI Firmware Implementations by Binarly”
Security Talk

Another Linux Kernel Bug Found that can allow an Unauthenticated user Root Privileges

Linux, often thought of as a more secure alternative to Microsoft, has not had an easy year. We have seen vulnerabilities that affect the iSCSI subsystem, the Extended Berkeley Packet Filter, the Polkit pkexec component bug and now two Kernel bugs. The latest one, dubbed “dirty pipe” It is a method that could allow a “local” user to overwrite read-only files including SUID flies.

Details
By Sean Kalinich
Sean Kalinich
Mar 08
Hits: 1877
  • Linux
  • Flaws
  • Vulnerabilities
  • Patching
  • kernel bug
  • dirty pipe

Read more: Another Linux Kernel Bug Found that can allow an...

No comments on “Another Linux Kernel Bug Found that can allow an Unauthenticated user Root Privileges”
Security Talk

Supply Chain Vulnerabilities Found in 150 Devices Spanning Multiple Industries Dubbed Access 7

Supply chain attacks are always a concern when it comes to device manufacture and distribution. If an attacker can compromise a part of the supply or management chain, they can affect a large part of the market with relatively minimal effort. The SolarWinds supply chain attack is a perfect example of this type of attack that successfully compromised multiple businesses with only one real “attack”. Now security researchers have disclosed a new group of vulnerabilities in PTC’s Axeda software that allow them to attack the devices after distribution.

Details
By Sean Kalinich
Sean Kalinich
Mar 08
Hits: 1204
  • Security
  • Vulnerabilities
  • access 7
  • operatinal technology
  • supply chain attacks

Read more: Supply Chain Vulnerabilities Found in 150...

No comments on “Supply Chain Vulnerabilities Found in 150 Devices Spanning Multiple Industries Dubbed Access 7”

More Articles …

  1. Google Announces Plans to Buy Mandiant for $5.4 Billion in Cash
  2. Samsung Confirms Breach and Theft of Source Code
  3. Firefox Users Urged to Update to Version 97.0.2 over two Use After free Vulnerabilities Found Exploited in the Wild
  4. Samsung Might be the Next Victim of the Same Group that Hacked NVIDIA
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21

Page 17 of 33

Follow Us

Follow DecryptedTech on Social Media

facebook twitter linkedin
Decryptedtech