Security News > 2024 > June > Week in review: Atlassian Confluence RCE PoC, new Kali Linux, Patch Tuesday forecast
High-risk Atlassian Confluence RCE fixed, PoC availableIf you're self-hosting an Atlassian Confluence Server or Data Center installation, you should upgrade to the latest available version to fix a high-severity RCE flaw for which a PoC and technical details are already public.
Kali Linux 2024.2 released: 18 new tools, countless updatesKali Linux 2024.2 is now available.
NethSecurity: Open-source Linux firewallNethSecurity is a free, open-source Linux firewall that simplifies network security deployment.
PoC for Progress Telerik RCE chain releasedSecurity researchers have published a proof-of-concept exploit that chains together two vulnerabilities to achieve unauthenticated remote code execution on Progress Telerik Report Servers.
20 free cybersecurity tools you might have missedHere, you will find a curated list of free cybersecurity tools you should consider.
Third-party vendors pose serious cybersecurity threat to national securityIn this Help Net Security video, Paul Prudhomme, Principal Security Analyst at SecurityScorecard, discusses the findings of the 2024 Redefining Resilience: Concentrated Cyber Risk in a Global Economy Research report.
News URL
Related news
- Week in review: Critical Zimbra RCE vulnerability exploited, Patch Tuesday forecast (source)
- CUPS vulnerabilities affecting Linux, Unix systems can lead to RCE (source)
- 'Patch yesterday': Zimbra mail servers under siege through RCE vuln (source)
- October 2024 Patch Tuesday forecast: Recall can be recalled (source)
- Microsoft October 2024 Patch Tuesday fixes 5 zero-days, 118 flaws (source)
- New scanner finds Linux, UNIX servers exposed to CUPS RCE attacks (source)
- Microsoft cleans up hot mess of Patch Tuesday preview (source)
- Patch Tuesday: Internet Explorer Vulnerabilities Still Pose a Problem (source)
- VMware fixes bad patch for critical vCenter Server RCE flaw (source)
- Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch (source)