{"uuid": "53756336-a3eb-400a-9453-057d89b06caf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-46747", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/383", "content": "Top Security News for 27/10/2023\n\nWhy cybersecurity training isn\u2019t working (and how to fix it)\nhttps://securityintelligence.com/articles/why-cybersecurity-training-isnt-working-and-how-to-fix-it/ \n\n6 steps to accelerate cybersecurity incident response\nhttps://malware.news/t/6-steps-to-accelerate-cybersecurity-incident-response/75002#post_1 \n\nF5 Issues Warning: BIG-IP Vulnerability Allows Remote Code Execution\nhttps://thehackernews.com/2023/10/f5-issues-warning-big-ip-vulnerability.html \n\nCVE-2023-46747: Pre-Auth Remote Code Execution in F5-BIGIP via AJP Request Smuggling\nhttps://www.reddit.com/r/netsec/comments/17h253u/cve202346747_preauth_remote_code_execution_in/ \n\nA cascade of compromise: unveiling Lazarus\u2019 new campaign\nhttps://malware.news/t/a-cascade-of-compromise-unveiling-lazarus-new-campaign/75004#post_1 \n\nA cascade of compromise: unveiling Lazarus\u2019 new campaign\nhttps://securelist.com/unveiling-lazarus-new-campaign/110888/ \n\nWorkflow of a zkSync Era transaction: from generation to finalization\nhttp://blog.quarkslab.com/zksync-transaction-workflow.html \n\nCritical Flaw in NextGen's Mirth Connect Could Expose Healthcare Data\nhttps://thehackernews.com/2023/10/critical-flaw-in-nextgens-mirth-connect.html \n\nCVE-2023-46747: Pre-Auth Remote Code Execution in F5-BIGIP via AJP Request Smuggling\nhttps://www.reddit.com/r/netsec/comments/17h253u/cve202346747_preauth_remote_code_execution_in/ \n\nStripedFly reclassified from petty larceny to APT.\nhttps://thecyberwire.com/stories/e41efe29905a42dc86888a014624baf9/stripedfly-reclassified-from-petty-larceny-to-apt \n\n    \nFollow Top Cyber News at https://t.me/TopCyberTechNews\nFeel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2023-10-27T07:00:06.000000Z"}