Volatile Cedar

Volatile Cedar is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. Volatile Cedar has been operating since 2012 and is motivated by political and ideological interests.

This Cyber News was published on attack.mitre.org. Publication date: Thu, 07 Dec 2023 22:12:07 +0000


Cyber News related to Volatile Cedar

Volatile Cedar - Volatile Cedar is a Lebanese threat group that has targeted individuals, companies, and institutions worldwide. Volatile Cedar has been operating since 2012 and is motivated by political and ideological interests. ...
1 year ago Attack.mitre.org Volatile Cedar
Using Memory Forensics Tools To Enhance Advanced Incident Response - By combining proper tools, trained personnel, and well-defined procedures, organizations can leverage memory forensics to significantly enhance their incident response capabilities and improve their overall security posture against increasingly ...
3 weeks ago Cybersecuritynews.com
Iran Threatens Israel's Critical Infrastructure With 'Polonium' Proxy - Israel's critical infrastructure is under threat from an Iranian proxy hacking group operating in Lebanon. Iran's partnership with armed militant groups throughout the Middle East is well documented. According to Microsoft, in the spring of 2022 ...
1 year ago Darkreading.com Dark Caracal POLONIUM Volatile Cedar
CVE-2022-31207 - The Omron SYSMAC Cx product family PLCs (CS series, CJ series, and CP series) through 2022-05-18 lack cryptographic authentication. They utilize the Omron FINS (9600/TCP) protocol for engineering purposes, including downloading projects and control ...
2 years ago
CVE-2023-4807 - Issue summary: The POLY1305 MAC (message authentication code) implementation ...
6 months ago
CVE-2021-47465 - In the Linux kernel, the following vulnerability has been resolved: KVM: PPC: Book3S HV: Fix stack handling in idle_kvm_start_guest() In commit 10d91611f426 ("powerpc/64s: Reimplement book3s idle code in C") kvm_start_guest() became ...
11 months ago Tenable.com
2024 will be a volatile year for cybersecurity as ransomware groups evolve - Hackers have significantly increased demands for ransomware, rising over 20% year-over-year to $600,000, according to Arctic Wolf. There are worrying signs that 2024 will be especially volatile, as ransomware groups expand their list of targets, and ...
1 year ago Helpnetsecurity.com
CVE-2024-47716 - In the Linux kernel, the following vulnerability has been resolved: ARM: 9410/1: vfp: Use asm volatile in fmrx/fmxr macros Floating point instructions in userspace can crash some arm kernels built with clang/LLD 17.0.6: BUG: unsupported FP ...
6 months ago Tenable.com
CVE-2014-7380 - The Cedar Kiosk (aka com.apps2you.cedarkiosk) application 1.1 for Android does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate. ...
10 years ago
CVE-2022-23397 - The Cedar Gate EZ-NET portal 6.5.5 6.8.0 Internet portal has a call to display messages to users which does not properly sanitize data sent in through a URL parameter. This leads to a Reflected Cross-Site Scripting vulnerability. NOTE: the vendor ...
6 months ago
CVE-2022-29277 - Incorrect pointer checks within the the FwBlockServiceSmm driver can allow arbitrary RAM modifications During review of the FwBlockServiceSmm driver, certain instances of SpiAccessLib could be tricked into writing 0xff to arbitrary system and SMRAM ...
2 years ago
Israel Blames Iran for Hospital Data Breach - Israel has named Iran and Hezbollah as the culprits behind a cyberattack on the the Ziv Medical Center. Some 500GB of medical data was stolen from the hospital in Safed, Israel, in the attack, which was first reported last month. Responsibility for ...
1 year ago Darkreading.com
CVE-2021-3746 - A flaw was found in the libtpms code that may cause access beyond the boundary of internal buffers. The vulnerability is triggered by specially-crafted TPM2 command packets that then trigger the issue when the state of the TPM2's volatile state ...
3 years ago
CVE-2005-1708 - templates.admin.users.user_form_processing in Blue Coat Reporter before 7.1.2 allows authenticated users to gain administrator privileges via an HTTP POST that sets volatile.user.administrator to true. ...
8 years ago
CVE-2005-1710 - Multiple cross-site scripting (XSS) vulnerabilities in Blue Coat Reporter before 7.1.2 allow remote attackers to inject arbitrary web script or HTML via (1) the username in an Add User window or (2) the license key (volatile.license_to_add parameter) ...
8 years ago
CVE-2016-8106 - A Denial of Service in Intel Ethernet Controller's X710/XL710 with Non-Volatile Memory Images before version 5.05 allows a remote attacker to stop the controller from processing network traffic working under certain network use conditions. ...
7 years ago
CVE-2017-9701 - In android for MSM, Firefox OS for MSM, QRD Android, with all Android releases from CAF using the Linux kernel, while processing OEM unlock/unlock-go fastboot commands data leak may occur, resulting from writing uninitialized stack structure to ...
7 years ago
CVE-2002-2327 - Unspecified vulnerability in the environmental monitoring subsystem in Solaris 8 running on Sun Fire 280R, V480 and V880 allows local users to cause a denial of service by setting volatile properties. ...
6 years ago
CVE-2010-3569 - Unspecified vulnerability in the Java Runtime Environment component in Oracle Java SE and Java for Business 6 Update 21, 5.0 Update 25, and 1.4.2_27 allows remote attackers to affect confidentiality, integrity, and availability via unknown vectors. ...
6 years ago
CVE-2019-1020012 - parse-server before 3.4.1 allows DoS after any POST to a volatile class. ...
5 years ago
CVE-2016-3145 - Lexmark printers with firmware ATL before ATL.021.063, CB before CB.021.063, PP before PP.021.063, and YK before YK.021.063 mishandle Erase Printer Memory and Erase Hard Disk actions, which allows physically proximate attackers to obtain sensitive ...
5 years ago
CVE-2019-15847 - The POWER9 backend in GNU Compiler Collection (GCC) before version 10 could optimize multiple calls of the __builtin_darn intrinsic into a single call, thus reducing the entropy of the random number generator. This occurred because a volatile ...
4 years ago
CVE-2021-32015 - In Nuvoton NPCT75x TPM 1.2 firmware 7.4.0.0, a local authenticated malicious user with high privileges could potentially gain unauthorized access to TPM non-volatile memory. NOTE: Upgrading to firmware version 7.4.0.1 will mitigate against the ...
3 years ago
CVE-2019-15877 - In FreeBSD 12.1-STABLE before r356606 and 12.1-RELEASE before 12.1-RELEASE-p3, driver specific ioctl command handlers in the ixl network driver failed to check whether the caller has sufficient privileges allowing unprivileged users to trigger ...
3 years ago
CVE-2021-3623 - A flaw was found in libtpms. The flaw can be triggered by specially-crafted TPM 2 command packets containing illegal values and may lead to an out-of-bounds access when the volatile state of the TPM 2 is marshalled/written or unmarshalled/read. The ...
1 year ago

Cyber Trends (last 7 days)