article thumbnail

CVE-2024-27198, CVE-2024-27199: Two Authentication Bypass Vulnerabilities in JetBrains TeamCity

Tenable

Two vulnerabilities with publicly available exploit code in JetBrains TeamCity on-premises software could result in attackers bypassing authentication and achieving code execution. CVE Description CVSSv3 Severity CVE-2024-27198 Authentication bypass vulnerability 9.8 to address both of these authentication bypass vulnerabilities.

article thumbnail

Identity security platform Oort bags new cash to grow its product

TechCrunch

406 Ventures and Energy Impact Partners with participation from Cisco Investments. ” There’s no question the market for identity security startups — startups that offer products to ID and authenticate people — is red-hot. million in a Series A round co-led by.406 VC firms poured $2.3

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

An expanded attack surface: The cybersecurity challenges of managing a hybrid workforce

CIO

As a result, the potential for malware to become resident on home computers is increasing.”. Locandro highlights the need to focus on the securing the edge with cyber products which cover “end point” protection, two-factor authentication as well as employees keeping up to date with virus protection software on home computers.

Malware 287
article thumbnail

CVE-2024-21762: Critical Fortinet FortiOS Out-of-Bound Write SSL VPN Vulnerability

Tenable

Dutch Authorities disclose that CVE-2022-42475 was abused to spread malware On February 6, Dutch authorities released a cybersecurity advisory about an attack against the Netherlands Ministry of Defence (MOD) in which attackers exploited CVE-2022-42475 against a Fortigate device to gain initial access and deploy malware known as "COATHANGER."

Malware 122
article thumbnail

CISA Adds Vulnerabilities Exploitable Via Bluetooth to KEV

Tenable

These vulnerabilities are exploitable via Bluetooth Low Energy (BLE). CVE-2022-31461 Owl Labs Meeting Owl Missing Authentication for Critical Function Vulnerability 7.4 CVE-2022-31463 Owl Labs Meeting Owl Improper Authentication Vulnerability 8.2 CVE-2022-31463 Owl Labs Meeting Owl Improper Authentication Vulnerability 8.2

Malware 64
article thumbnail

Radar trends to watch: May 2022

O'Reilly Media - Ideas

There was one announcement after another; most new models were larger than the previous ones, several claimed to be significantly more energy efficient. trillion parameters–but requiring significantly less energy to train than GPT-3. It’s also good to see that energy efficiency has become part of the conversation.

article thumbnail

Radar Trends to Watch: December 2022

O'Reilly Media - Ideas

The popularity of cryptojacking (mining cryptocurrency with malware planted in someone else’s applications) continues to rise, as the collapse in cryptocurrency prices makes legitimate mining unprofitable. A threat group named Worok is using steganography to hide malware within PNG images. Its intent is to detect vulnerabilities.