Remove 2006 Remove Cybersecurity Remove Libraries Remove Security
article thumbnail

US CISA added 17 flaws to its Known Exploited Vulnerabilities Catalog

Security Affairs

The Cybersecurity and Infrastructure Security Agency (CISA) this week added seventeen actively exploited vulnerabilities to the Catalog. CVE Number CVE Title Required Action Due Date CVE-2021-32648 October CMS Improper Authentication 2/1/2022 CVE-2021-21315 System Information Library for node.js Pierluigi Paganini.

CMS 99
article thumbnail

The Hacker Mind Podcast: Hacking Behavioral Biometrics

ForAllSecure

I’m just not convinced that a fingerprint or an image of my face is secure enough. In security we traditionally define the different factors of authentication as something you know, so that could be the username and password, or an answer to a security question. Macorin: My name is Justin Macorin cybersecurity research.

article thumbnail

Top 6 Rootkit Threats and How to Protect Yourself

eSecurity Planet

This also gives them the ability to deftly evade detection by functioning at the same security level as the OS itself. Also known as an “application rootkit,” the user-mode rootkit replaces executables and system libraries and modifies the behavior of application programming interfaces (APIs). performing regular security maintenance.