智能运维
-
How To Fix CVE-2021-1577- A Critical Arbitrary File Read And Write Vulnerability In Cisco APIC
Cisco has published advisory for one critical severity, one high severity vulnerability, and two medium severity vulnerabilities in Cisco APIC (Application Policy Infrastructure Controller). Successf…
-
How To Secure Your APC Smart-UPS Devices From TLStorm Vulnerabilities
Security researchers from Armis have disclosed a set of three critical vulnerabilities in APC Smart-UPS devices, cumulatively called TLStorm vulnerabilities. A remote attacker can string these vulner…
-
How To Fix The 16 New LPE And ACE Vulnerabilities In HP BIOS
Binarly, a well-known firmware security specialist, disclosed 16new LPE (Local Privilege escalation) and ACT (Arbitrary code execution) vulnerabilities in HP BIOS. All these vulnerabilities are consi…
-
How To Fix The Dirty Pipe Vulnerability In Linux Kernel- CVE-2022-0847
Max Kellermann, a developer from IONOS software, has identified a vulnerability in the Linux Kernel that allows overwriting data in arbitrary read-only files. The vulnerability has been tracked under…
-
How To Fix CVE-2022-0492- Privilege Escalation And Container Escape Vulnerabilities In Cgroups
A new vulnerability has been spotted recently in the Linux Control group, a Linux kernel feature that allows processes to be organized into hierarchical groups. The vulnerability is tracked as CVE-20…
-
How To Fix CVE-2021-4191- An User Enumeration Vulnerability In GitLab
Rapid 7, a well-known security firm, disclosed a vulnerability in GitLab. The vulnerability tracked as CVE-2021-4191 with a base score of 5.3 in the Common Vulnerability Scoring System is a medium se…
-
How To Fix CVE-2022-20754(5)- Critical Command Injection And Arbitrary Code Execution Vulnerabilities In Cisco Expressway Series And TelePresence VCS
During their internal security test, Cisco Advanced Security Initiatives Group (ASIG) found two critical vulnerabilities in Cisco Expressway Series and TelePresence Video Communication Server (VCS). …
-
Fix The Five Memory Corruption Vulnerabilities In PJSIP Library ASAP
The Security team from JFrog has identified five memory corruption vulnerabilities in the PJSIP library, a widely used open-source multimedia communication library from Teluu. Successful exploit…
-
5 Best Open-Source Tools To Monitor Containers
Monitoring is essential for businesses to ensure that the required systems are up and running. Monitoring multiple aspects of IT infrastructure can be quite troublesome and cause difficulties if not …
-
Understanding Indicator Of Compromise (IoC)
In this post, we’re going to be describing and getting an understanding of indicators of compromise. As the name suggests, an indicator of compromise, or an IoC, gives you an indication of when…