call
-
On 7 February 2025, Europol hosted a Quantum Safe Financial Forum (QSFF) event, during which the QSFF has issued a call to action for financial institutions and policymakers, urging them to prioritise the transition to quantum-safe cryptography. With the rapid advancement of quantum computing, the financial sector faces an imminent threat to its cryptographic security.…
-
arXiv:2502.08679v1 Announce Type: cross Abstract: Malware classification in dynamic environments presents a significant challenge due to concept drift, where the statistical properties of malware data evolve over time, complicating detection efforts. To address this issue, we propose a deep learning framework enhanced with a genetic algorithm to improve malware classification accuracy and adaptability. Our approach…
-
By Josselin Feist Introduction to Malware Binary Triage (IMBT) Course Looking to level up your skills? Get 10% off using coupon code: MWNEWS10 for any flavor. Enroll Now and Save 10%: Coupon Code MWNEWS10 Note: Affiliate link – your enrollment helps support this platform at no extra cost to you. Writing smart contracts requires a…
-
A vulnerability, which was classified as problematic, was found in Tussendoor Internet & Marketing Call me Now Plugin up to 1.0.5 on WordPress. Affected is an unknown function. The manipulation leads to cross-site request forgery. This vulnerability is traded as CVE-2025-23745. It is possible to launch the attack remotely. There is no exploit available.
-
A vulnerability, which was classified as problematic, was found in LamPD Call To Action Popup Plugin up to 1.0.2 on WordPress. Affected is an unknown function. The manipulation leads to cross site scripting. This vulnerability is traded as CVE-2025-23605. It is possible to launch the attack remotely. There is no exploit available.
-
Also: Addressing AI Vulnerabilities and Governance ChallengesDeepSeek, an advanced open-source AI model, is under scrutiny for its safety guardrails failing multiple security tests and a data leak that exposed user information and API keys. Sam Curry, CISO at Zscaler, discusses AI security, risk management and upcoming U.S. policy changes.
-
Victims in Kenya urged the International Criminal Court (ICC) on Sunday to investigate alleged cases of abduction amid a rise in human rights violations across the country. The Kenya Human Rights Commission (KHRC), together with other local human rights organizations and several victims of enforced disappearances signed a petition demanding the ICC to investigate alleged…
-
The recent breach of PowerSchool, a widely used student and teacher management software platform, is a stark reminder of the precarious state of cybersecurity in the U.S. education sector.
-
Sen. John Hickenlooper delivers a keynote address emphasizing the importance of strengthening the resilience of the Federal Civilian Executive Branch (FCEB) against evolving cyber threats during the launch of the Center for FCEB Resilience.
-
A vulnerability classified as critical was found in Qualcomm Snapdragon. Affected by this vulnerability is an unknown functionality of the component IOCTL Call Handler. The manipulation leads to use after free. This vulnerability is known as CVE-2024-23354. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the…
-
A vulnerability classified as critical was found in Qualcomm Snapdragon. Affected by this vulnerability is an unknown functionality of the component IOCTL Call Handler. The manipulation leads to use after free. This vulnerability is known as CVE-2024-23354. The attack needs to be approached locally. There is no exploit available. It is recommended to upgrade the…
-
Greenland must make its own decisions about independence from Denmark, Prime Minister Mette Frederiksen told President-elect Trump in a Wednesday phone call.The big picture: Trump, since his first term, has repeatedly floated the idea of the U.S. buying Greenland even though the island’s leaders have said it is not for sale.The issue has taken on…
-
New Call for Papers Deadline for “VulnCon 2025” — January 31, 2025The CVE Program and FIRST will co-host VulnCon 2025 at the McKimmon Center in Raleigh, North Carolina, USA, on April 7–10, 2025. The Call for Papers deadline has been extended until January 31, 2025. See details here.Registration, both virtual and in-person, is open on this page on the…
-
A vulnerability, which was classified as critical, was found in Qualcomm Snapdragon Compute, Snapdragon Connectivity, Snapdragon Consumer Electronics Connectivity and Snapdragon Industrial IOT. Affected is an unknown function of the component IOCTL Call Handler. The manipulation leads to buffer overflow. This vulnerability is traded as CVE-2024-45541. Local access is required to approach this attack. There…
-
A vulnerability was found in Qualcomm Snapdragon Compute, Snapdragon Connectivity and Snapdragon Consumer Electronics Connectivity FastConnect 6900 up to WSA8845 and classified as critical. Affected by this issue is some unknown functionality of the component IOCTL Call Handler. The manipulation leads to buffer over-read. This vulnerability is handled as CVE-2024-45546. It is possible to launch…
-
A vulnerability was found in Qualcomm Snapdragon Compute, Snapdragon Connectivity and Snapdragon Consumer Electronics Connectivity FastConnect 6900 up to WSA8845. It has been classified as critical. This affects an unknown part of the component IOCTL Call Handler. The manipulation leads to buffer overflow. This vulnerability is uniquely identified as CVE-2024-45547. The attack needs to be…
-
CVE-2024-45550 | Qualcomm Snapdragon Compute FastConnect 6900 up to WSA8845 IOCTL Call array index
·
A vulnerability was found in Qualcomm Snapdragon Compute FastConnect 6900 up to WSA8845. It has been rated as critical. This issue affects some unknown processing of the component IOCTL Call Handler. The manipulation leads to improper validation of array index. The identification of this vulnerability is CVE-2024-45550. Local access is required to approach this attack.…
-
A vulnerability, which was classified as problematic, was found in Call Blocker App 6.6.3 on Android. This affects an unknown part. The manipulation leads to denial of service. This vulnerability is uniquely identified as CVE-2023-29726. Attacking locally is a requirement. There is no exploit available.
-
A vulnerability classified as problematic was found in Call Blocker App 6.6.3 on Android. This vulnerability affects unknown code. The manipulation leads to Local Privilege Escalation. This vulnerability was named CVE-2023-29728. Attacking locally is a requirement. There is no exploit available.
-
A vulnerability has been found in Call Blocker App 6.6.3 on Android and classified as problematic. This vulnerability affects unknown code of the component Database Handler. The manipulation leads to denial of service. This vulnerability was named CVE-2023-29727. It is possible to launch the attack on the local host. There is no exploit available.