The Voice of Cyber®

Security Operations

Security Operations encompasses the processes, technologies, and personnel responsible for monitoring and responding to security incidents. Security Operations Centres (SOCs) play a central role in this domain, leveraging advanced tools and methodologies to detect, analyse, and mitigate potential cyber threats in real-time. Security Operations involves continuous monitoring of networks, systems, and applications, as well as incident response activities to address and neutralise security incidents promptly.

Newest Release

Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities: All you need to know

Unix CUPS Unauthenticated RCE Zero-Day Vulnerabilities: All you need to know

On September 23rd, Twitter user Simone Margaritelli (@evilsocket) announced that he has discovered and privately disclosed a CVSS 9.9 GNU/Linux unauthenticated RCE, which affects almost all Linux distributions, and that the public disclosure will happen on September 30th, Due to a suspected leak in the disclosure process, @evilsocket decided to advance the disclosure, and on September 26th, the vulnerabilities were disclosed in @evilsocket’s blog, along with a full proof of concept. The vulnerabilities were given the identifiers CVE-2024-47076, CVE-2024-47175, CVE-2024-47176, CVE-2024-47177. Which vulnerabilities were disclosed? All of the disclosed vulnerabilities are related to printing ...

Deep Dive Articles

Sort By

  • Date
  • Title

In The News

Sort By

  • Date
  • Title
Podcasts On Security Operations
No results found.