ATENTIONβΌ New - CVE-2019-18868
π Read
via "National Vulnerability Database".
Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to access MySQL credentials in cleartext in /engine/db.inc, /lang/nl.bak, or /lang/en.bak.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18867
π Read
via "National Vulnerability Database".
Browsable directories in Blaauw Remote Kiln Control through v3.00r4 allow an attacker to enumerate sensitive filenames and locations, including source code. This affects /ajax/, /common/, /engine/, /flash/, /images/, /Images/, /jscripts/, /lang/, /layout/, /programs/, and /sms/.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18865
π Read
via "National Vulnerability Database".
Information disclosure via error message discrepancies in authentication functions in Blaauw Remote Kiln Control through v3.00r4 allows an unauthenticated attacker to enumerate valid usernames.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-5493
π Read
via "National Vulnerability Database".
ATTO FibreBridge 7500N firmware versions prior to 2.90 are susceptible to a vulnerability which allows an unauthenticated remote attacker to cause Denial of Service (DoS).π Read
via "National Vulnerability Database".
β Vcrypt ransomware holds your files hostage without encrypting them β
π Read
via "Naked Security".
Here's a ransomware story with a bit of a difference. Some of your files get wiped out, but others can be recovered without paying.π Read
via "Naked Security".
Naked Security
Vcrypt ransomware brings along a buddy to do the encryption
Hereβs a ransomware story with a difference. Some of your files can be recovered without paying, while others get wiped out forever.
π World Password Day: We're moving toward a passwordless infrastructure π
π Read
via "Security on TechRepublic".
As we celebrate World Password Day, companies of all sizes are looking to password alternatives including YubiKeys, Google Titan keys, and biometrics. A Gartner analyst weighs in.π Read
via "Security on TechRepublic".
TechRepublic
World Password Day: We're moving toward a passwordless infrastructure
As we celebrate World Password Day, companies of all sizes are looking to password alternatives including YubiKeys, Google Titan keys, and biometrics. A Gartner analyst weighs in.
π 13% of SMBs have already experienced a cyberattack since the COVID-19 pandemic began π
π Read
via "Security on TechRepublic".
More than one in five also acknowledge transitioning to remote work without a policy, according to an Alliant Cybersecurity report.π Read
via "Security on TechRepublic".
TechRepublic
13% of SMBs have already experienced a cyberattack since the COVID-19 pandemic began
More than one in five also acknowledge transitioning to remote work without a policy, according to an Alliant Cybersecurity report.
ATENTIONβΌ New - CVE-2019-18872
π Read
via "National Vulnerability Database".
Weak password requirements in Blaauw Remote Kiln Control through v3.00r4 allow a user to set short or guessable passwords (e.g., 1 or 1234).π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18871
π Read
via "National Vulnerability Database".
A path traversal in debug.php accessed via default.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to upload arbitrary files, leading to arbitrary remote code execution.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18870
π Read
via "National Vulnerability Database".
A path traversal via the iniFile parameter in excel.php in Blaauw Remote Kiln Control through v3.00r4 allows an authenticated attacker to download arbitrary files from the host machine.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18869
π Read
via "National Vulnerability Database".
Leftover Debug Code in Blaauw Remote Kiln Control through v3.00r4 allows a user to execute arbitrary php code via /default.php?idx=17.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2019-18866
π Read
via "National Vulnerability Database".
Unauthenticated SQL injection via the username in the login mechanism in Blaauw Remote Kiln Control through v3.00r4 allows a user to extract arbitrary data from the rkc database.π Read
via "National Vulnerability Database".
π΄ Zoom Acquires Keybase, Plans for End-to-End Encrypted Chats π΄
π Read
via "Dark Reading: ".
The company's first acquisition to date is part of a 90-day plan to improve security in its video communications platform.π Read
via "Dark Reading: ".
Dark Reading
Zoom Acquires Keybase, Plans for End-to-End Encrypted Chats
The company's first acquisition to date is part of a 90-day plan to improve security in its video communications platform.
β Zoom Beefs Up End-to-End Encryption to Thwart βZoombombersβ β
π Read
via "Threatpost".
As the company continues to battle security woes, it has acquired Keybase to boost security and privacy. A full cryptographic draft architecture will be available on May 22.π Read
via "Threatpost".
Threat Post
Zoom Beefs Up End-to-End Encryption to Thwart βZoombombersβ
As the company continues to battle security woes, it has acquired Keybase to boost security and privacy. A full cryptographic draft architecture will be available on May 22.
ATENTIONβΌ New - CVE-2019-18864
π Read
via "National Vulnerability Database".
/server-info and /server-status in Blaauw Remote Kiln Control through v3.00r4 allow an unauthenticated attacker to gain sensitive information about the host machine.π Read
via "National Vulnerability Database".
π Web and network perimeter vulnerabilities slightly lower than 2019 π
π Read
via "Security on TechRepublic".
Yet, even with a 30% decline, web applications are still at risk and new scan targets have more vulnerabilities than others, according to a new Acunetix report.π Read
via "Security on TechRepublic".
TechRepublic
Web and network perimeter vulnerabilities slightly lower than 2019
Yet, even with a 30% decline, web applications are still at risk and new scan targets have more vulnerabilities than others, according to a new Acunetix report.
π U.S., UK Govt: APT Groups Targeting Healthcare Orgs π
π Read
via "Subscriber Blog RSS Feed ".
It seems as if there are alerts almost daily now around how bad actors are leveraging the ongoing coronavirus (COVID-19) pandemic to target end users.The latest came this week after agencies from two countries, the U.S. and the U.K. warned about how advanced persistent threat (APT) groups are using the pandemic to their advantage. π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
U.S., UK Govt: APT Groups Targeting Healthcare Orgs
A joint alert via cybersecurity agencies in the UK and U.S. this week warned about how APT groups are exploiting COVID-19 to collect PII, IP, and other intelligence.
π΄ Now More Than Ever? Securing the Software Life Cycle π΄
π Read
via "Dark Reading: ".
The more things change, the more they stay the same. That's true for software security, even in these turbulent times.π Read
via "Dark Reading: ".
Dark Reading
Now More Than Ever? Securing the Software Life Cycle
The more things change, the more they stay the same. That's true for software security, even in these turbulent times.
β Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA β
π Read
via "Threatpost".
Cisco has fixed 12 high-severity flaws in its Adaptive Security Appliance software and Firepower Threat Defense software.π Read
via "Threatpost".
Threat Post
Cisco Fixes High-Severity Flaws In Firepower Security Software, ASA
Cisco has fixed 12 high-severity flaws in its Adaptive Security Appliance software and Firepower Threat Defense software.
π΄ Mac RAT Rides 2FA App Onto Systems π΄
π Read
via "Dark Reading: ".
The new macOS remote access Trojan from the Lazarus Group uses a two-factor authentication app as its delivery mechanism.π Read
via "Dark Reading: ".
Dark Reading
Mac RAT Rides 2FA App Onto Systems
The new macOS remote access Trojan from the Lazarus Group uses a two-factor authentication app as its delivery mechanism.
π How to properly secure sysctl on Linux π
π Read
via "Security on TechRepublic".
Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.π Read
via "Security on TechRepublic".
TechRepublic
How to properly secure sysctl on Linux
Protecting your Linux servers against SYN attacks and IP spoofing isn't nearly as hard you think. Jack Wallen shows you how.