Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-31650PUBLISHED: 2022-05-25In SoX 14.4.2, there is a floating-point exception in lsx_aiffstartwrite in aiff.c in libsox.a.
CVE-2022-31651PUBLISHED: 2022-05-25In SoX 14.4.2, there is an assertion failure in rate_init in rate.c in libsox.a.
CVE-2022-29256PUBLISHED: 2022-05-25
sharp is an application for Node.js image processing. Prior to version 0.30.5, there is a possible vulnerability in logic that is run only at `npm install` time when installing versions of `sharp` prior to the latest v0.30.5. If an attacker has the ability to set the value of the `PKG_CONFIG_PATH` e...
CVE-2022-26067PUBLISHED: 2022-05-25
An information disclosure vulnerability exists in the OAS Engine SecureTransferFiles functionality of Open Automation Software OAS Platform V16.00.0112. A specially-crafted series of network requests can lead to arbitrary file read. An attacker can send a sequence of requests to trigger this vulnera...
CVE-2022-26077PUBLISHED: 2022-05-25
A cleartext transmission of sensitive information vulnerability exists in the OAS Engine configuration communications functionality of Open Automation Software OAS Platform V16.00.0112. A targeted network sniffing attack can lead to a disclosure of sensitive information. An attacker can sniff networ...
User Rank: Apprentice
12/15/2020 | 10:59:39 AM
Too many organizations think that they can mostly ignore security in how they go about operating and organizing what they do on a daily basis and then throw a bunch of cash at some fancy tools to layer on top under the false impression that will save them...it won't. Sure they may have a CISO and a cyber-security staff but those positions aren't looked at as fundemental to shaping how the business operates, they are add ons that live in thier own world and do their own thing and mostly get called upon to report when something has already gone wriong, much like the security guard in your story.
Ultimately, decent security isn't really that complex... what's going to stop 95 percent of the breaches that occur doesn't require rocket science or a boat load of cash, nor even that much in the way of tools beyond the basics.... what it does require is discipline and consistancy and an understanding from the ground up that security WILL effect the way the organization operates, how non-security staff have to behave and yes, sometimes it will be a slight inconvenience.
Cyber-security is much like sports, if you ignore the fundementals you aren't going to win ball games, no matter how much money you throw at equipment. Cyber-Security today for too many organizations is alot like spending $1000 on a bat and $1500 on a glove .... and never holding practice.