digitalcourage.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
Diese Instanz wird betrieben von Digitalcourage e.V. für die Allgemeinheit. Damit wir das nachhaltig tun können, erheben wir einen jährlichen Vorausbeitrag von 1€/Monat per SEPA-Lastschrifteinzug.

Server stats:

825
active users

#qualys

1 post1 participant0 posts today
Mark Stosberg<p>Instead of building navigation with icons, Qualys thought it'd be a great idea to use boxes, each containing an acronym which can stand for any number of things.</p><p>If you are thinking that CSAM is for Child Sexual Abuse Material, that PM is for Project Management and PS is for Photoshop, well, you'd be wrong on all counts.</p><p>Can you guess why some buttons are different colors but the different colors are not all grouped together? Me neither.</p><p><a href="https://urbanists.social/tags/qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>qualys</span></a> <a href="https://urbanists.social/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a> <a href="https://urbanists.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://urbanists.social/tags/design" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>design</span></a> <a href="https://urbanists.social/tags/softwaregore" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>softwaregore</span></a></p>
Pyrzout :vm:<p>Microsoft fixes critical wormable Windows flaw (CVE-2025-47981) <a href="https://www.helpnetsecurity.com/2025/07/09/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/07/09</span><span class="invisible">/microsoft-fixes-critical-wormable-windows-flaw-cve-2025-47981/</span></a> <a href="https://social.skynetcloud.site/tags/MicrosoftEdge" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MicrosoftEdge</span></a> <a href="https://social.skynetcloud.site/tags/WindowsServer" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>WindowsServer</span></a> <a href="https://social.skynetcloud.site/tags/PatchTuesday" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PatchTuesday</span></a> <a href="https://social.skynetcloud.site/tags/SharePoint" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SharePoint</span></a> <a href="https://social.skynetcloud.site/tags/TrendMicro" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>TrendMicro</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/MSOffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MSOffice</span></a> <a href="https://social.skynetcloud.site/tags/Tenable" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Tenable</span></a> <a href="https://social.skynetcloud.site/tags/Windows" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Windows</span></a> <a href="https://social.skynetcloud.site/tags/Ivanti" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ivanti</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>Innovator Spotlight: Qualys – Source: www.cyberdefensemagazine.com <a href="https://ciso2ciso.com/innovator-spotlight-qualys-source-www-cyberdefensemagazine-com/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">ciso2ciso.com/innovator-spotli</span><span class="invisible">ght-qualys-source-www-cyberdefensemagazine-com/</span></a> <a href="https://social.skynetcloud.site/tags/rssfeedpostgeneratorecho" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>rssfeedpostgeneratorecho</span></a> <a href="https://social.skynetcloud.site/tags/cybersecurityplatform" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurityplatform</span></a> <a href="https://social.skynetcloud.site/tags/compliancevisibility" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>compliancevisibility</span></a> <a href="https://social.skynetcloud.site/tags/cyberdefensemagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefensemagazine</span></a> <a href="https://social.skynetcloud.site/tags/cyberdefensemagazine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberdefensemagazine</span></a> <a href="https://social.skynetcloud.site/tags/executivereporting" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>executivereporting</span></a> <a href="https://social.skynetcloud.site/tags/Securityleadership" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Securityleadership</span></a> <a href="https://social.skynetcloud.site/tags/CyberSecurityNews" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CyberSecurityNews</span></a> <a href="https://social.skynetcloud.site/tags/governancetools" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>governancetools</span></a> <a href="https://social.skynetcloud.site/tags/auditreadiness" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>auditreadiness</span></a> <a href="https://social.skynetcloud.site/tags/CISOStrategy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>CISOStrategy</span></a> <a href="https://social.skynetcloud.site/tags/policyaudit" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>policyaudit</span></a> <a href="https://social.skynetcloud.site/tags/cyberrisk" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberrisk</span></a> <a href="https://social.skynetcloud.site/tags/Spotlight" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Spotlight</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a></p>
Verfassungklage@troet.cafe<p><a href="https://troet.cafe/tags/Patches" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Patches</span></a> kommen: </p><p>Zwei Lücken verleihen <a href="https://troet.cafe/tags/Angreifern" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Angreifern</span></a> <a href="https://troet.cafe/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a>-Rechte unter <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p><p>Durch Verkettung der beiden Lücken lassen sich <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Systeme vollständig kompromittieren. Admins sollten so bald wie möglich patchen. </p><p><a href="https://troet.cafe/tags/Sicherheitsforscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsforscher</span></a> von <a href="https://troet.cafe/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> haben zwei gefährliche <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a> aufgedeckt, mit denen Angreifer auf <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>-Systemen einen <a href="https://troet.cafe/tags/Root" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Root</span></a>-Zugriff erlangen können. </p><p><a href="https://www.golem.de/news/patches-kommen-zwei-luecken-verleihen-angreifern-root-rechte-unter-linux-2506-197246.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">golem.de/news/patches-kommen-z</span><span class="invisible">wei-luecken-verleihen-angreifern-root-rechte-unter-linux-2506-197246.html</span></a></p>
Pyrzout :vm:<p>Chaining two LPEs to get “root”: Most Linux distros vulnerable (CVE-2025-6018, CVE-2025-6019) <a href="https://www.helpnetsecurity.com/2025/06/18/chaining-two-lpes-to-get-root-most-linux-distros-vulnerable-cve-2025-6018-cve-2025-6019/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/18</span><span class="invisible">/chaining-two-lpes-to-get-root-most-linux-distros-vulnerable-cve-2025-6018-cve-2025-6019/</span></a> <a href="https://social.skynetcloud.site/tags/vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Don" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Don</span></a>'tmiss <a href="https://social.skynetcloud.site/tags/Hotstuff" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hotstuff</span></a> <a href="https://social.skynetcloud.site/tags/openSUSE" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>openSUSE</span></a> <a href="https://social.skynetcloud.site/tags/Debian" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Debian</span></a> <a href="https://social.skynetcloud.site/tags/Fedora" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Fedora</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> <a href="https://social.skynetcloud.site/tags/Ubuntu" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Ubuntu</span></a> <a href="https://social.skynetcloud.site/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Newk<p><a href="https://infosec.exchange/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> TRU Uncovers Chained LPE: SUSE 15 PAM to Full Root via libblockdev/udisks</p><p><a href="https://blog.qualys.com/vulnerabilities-threat-research/2025/06/17/qualys-tru-uncovers-chained-lpe-suse-15-pam-to-full-root-via-libblockdev-udisks" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">blog.qualys.com/vulnerabilitie</span><span class="invisible">s-threat-research/2025/06/17/qualys-tru-uncovers-chained-lpe-suse-15-pam-to-full-root-via-libblockdev-udisks</span></a></p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>infosec</span></a></p>
Verfassungklage@troet.cafe<p>Neue <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a> <a href="https://troet.cafe/tags/Sicherheitsl%C3%BCcken" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitslücken</span></a>: <a href="https://troet.cafe/tags/Race" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Race</span></a> <a href="https://troet.cafe/tags/Conditions" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Conditions</span></a> bedrohen sensible Daten. </p><p>Zwei neu entdeckte Schwachstellen gefährden aktuell bestimmte <a href="https://troet.cafe/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a>- <a href="https://troet.cafe/tags/Distributionen" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Distributionen</span></a>. Die <a href="https://troet.cafe/tags/Sicherheitsforscher" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sicherheitsforscher</span></a> von <a href="https://troet.cafe/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> haben Race Conditions in den Komponenten apport und systemd-coredump identifiziert. Sie wurden unter den CVE-Nummern CVE-2025-5054 und CVE-2025-4598 veröffentlicht und ermöglichen es lokalen Angreifern, auf Speicherabzüge privilegierter Prozesse zuzugreifen. </p><p><a href="https://fosstopia.de/sicherheitslucken-linux/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">fosstopia.de/sicherheitslucken</span><span class="invisible">-linux/</span></a></p>
Pyrzout :vm:<p>Photos: Infosecurity Europe 2025, part 2 <a href="https://www.helpnetsecurity.com/2025/06/04/infosecurity-europe-2025-photo/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">helpnetsecurity.com/2025/06/04</span><span class="invisible">/infosecurity-europe-2025-photo/</span></a> <a href="https://social.skynetcloud.site/tags/BytesSoftwareServices" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>BytesSoftwareServices</span></a> <a href="https://social.skynetcloud.site/tags/RootshellSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RootshellSecurity</span></a> <a href="https://social.skynetcloud.site/tags/VeeamSoftware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>VeeamSoftware</span></a> <a href="https://social.skynetcloud.site/tags/ManageEngine" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ManageEngine</span></a> <a href="https://social.skynetcloud.site/tags/PushSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PushSecurity</span></a> <a href="https://social.skynetcloud.site/tags/Bitdefender" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Bitdefender</span></a> <a href="https://social.skynetcloud.site/tags/conferences" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>conferences</span></a> <a href="https://social.skynetcloud.site/tags/DarkInvader" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DarkInvader</span></a> <a href="https://social.skynetcloud.site/tags/AbnormalAI" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AbnormalAI</span></a> <a href="https://social.skynetcloud.site/tags/AttackIQ" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AttackIQ</span></a> <a href="https://social.skynetcloud.site/tags/iStorage" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>iStorage</span></a> <a href="https://social.skynetcloud.site/tags/Sonatype" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Sonatype</span></a> <a href="https://social.skynetcloud.site/tags/Garner" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Garner</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> <a href="https://social.skynetcloud.site/tags/News" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>News</span></a></p>
Pyrzout :vm:<p>Linux Crash Reporting Flaws (CVE-2025-5054, 4598) Expose Password Hashes <a href="https://hackread.com/linux-crash-reporting-flaws-expose-password-hashes/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/linux-crash-repor</span><span class="invisible">ting-flaws-expose-password-hashes/</span></a> <a href="https://social.skynetcloud.site/tags/systemdcoredump" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>systemdcoredump</span></a> <a href="https://social.skynetcloud.site/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://social.skynetcloud.site/tags/Vulnerability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Vulnerability</span></a> <a href="https://social.skynetcloud.site/tags/Security" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Security</span></a> <a href="https://social.skynetcloud.site/tags/Password" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Password</span></a> <a href="https://social.skynetcloud.site/tags/Apport" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Apport</span></a> <a href="https://social.skynetcloud.site/tags/Hashes" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Hashes</span></a> <a href="https://social.skynetcloud.site/tags/Qualys" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Qualys</span></a> <a href="https://social.skynetcloud.site/tags/Linux" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Linux</span></a></p>

#needrestart 3.8 was released:
github.com/liske/needrestart/r

This coordinated release contains 4 security fixes for local privilege escalations found by the Qualys Security Advisory team: qualys.com/2024/11/19/needrest

An local attacker can trick needrestart to execute arbitrary code as root. Debian and Ubuntu already shipping security updates.

You should apply these updates in a timely manner. These issues can be mitigated by disabling the interpreter heuristic.

GitHubRelease 3.8 · liske/needrestartSecurity [Core] CVE-2024-48991: Prevent race condition on /proc/$PID/exec evaluation. (responsibly reported by Qualys) [Interp] CVE-2024-11003: Drop usage of Module::ScanDeps to prevent LPE. (resp...