• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
cisa warns against actively exploited chrome and d link security flaws

CISA warns against actively exploited Chrome and D-Link security flaws

You are here: Home / General Cyber Security News / CISA warns against actively exploited Chrome and D-Link security flaws
September 9, 2022

Shutterstock

The US Cybersecurity and Infrastructure Security Agency (CISA) has added 12 extra security flaws to its Regarded Exploited Vulnerabilities (KEV) catalog, including two critical D-Connection vulnerabilities and two (now-patched) zero-days in Google Chrome and the QNAP Picture Station.

Google issued an emergency security update for the zero-working day, tracked as CVE-2022-3075, on September 2. The flaw is reportedly the sixth zero-day chrome vulnerability observed by Google in 2022. 

✔ Approved Seller From Our Partners
Mullvad VPN Discount

Protect your privacy by Mullvad VPN. Mullvad VPN is one of the famous brands in the security and privacy world. With Mullvad VPN you will not even be asked for your email address. No log policy, no data from you will be saved. Get your license key now from the official distributor of Mullvad with discount: SerialCart® (Limited Offer).

➤ Get Mullvad VPN with 12% Discount


On September 5, QNAP NAS declared it has patched a zero-working day bug in its Photograph Station software program, tracked as CVE-2022-27593. The update follows a DeadBolt ransomware attack.

Two critical D-Hyperlink security flaws, beneath the monickers CVE-2022-28958 and CVE-2022-26258, can do the job as backdoors for the Mirai-based Moobot botnet to attain choose comprehensive regulate over unpatched units.

Presented the severity, all Federal Civilian Government Branch Agencies (FCEB) organizations must patch their systems versus the aforementioned security bugs in conformity with the binding operational directive (BOD 22-01) published in November. The very last date for issuing the patches is September 29.

Although DHS’ BOD 22-01 only applies to FCEB companies, the cybersecurity agency strongly urges U.S. corporations in each the personal and community sectors to prioritize patching to limit more attacks.

“These varieties of vulnerabilities are a frequent attack vector for malicious cyber actors and pose a important risk to the federal enterprise,” the US cybersecurity agency spelled out Thursday.

The CISA has additional 800 security flaws to its catalog of bugs exploited in attacks since it issued its binding directive in November, demanding federal organizations to resolve them on a far more repeated foundation.


Some components of this write-up are sourced from:
www.itpro.co.uk

Previous Post: «u.s. seizes cryptocurrency worth $30 million stolen by north korean U.S. Seizes Cryptocurrency Worth $30 Million Stolen by North Korean Hackers
Next Post: 6 Top API Security Risks! Favored Targets for Attackers If Left Unmanaged 6 top api security risks! favored targets for attackers if»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • CISA Unveils Ransomware Notification Initiative
  • WooCommerce Patches Critical Plugin Flaw Affecting Half a Million Sites
  • GitHub Updates Security Protocol For Operations Over SSH
  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet

Copyright © TheCyberSecurity.News, All Rights Reserved.