ATENTION‼ New - CVE-2012-3341
📖 Read
via "National Vulnerability Database".
IBM InfoSphere Guardium 7.0, 8.0, 8.01, and 8.2 is vulnerable to cross-site scripting, caused by improper validation of user-supplied input. A remote attacker could exploit this vulnerability using a specially-crafted URL to execute script in a victim's Web browser within the security context of the hosting Web site, once the URL is clicked. An attacker could use this vulnerability to steal the victim's cookie-based authentication credentials. IBM X-Force ID: 78294.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2012-3340
📖 Read
via "National Vulnerability Database".
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to XML external entity injection, caused by improper validation of user-supplied input. A remote authenticated attacker could exploit this vulnerability to obtain sensitive information. IBM X-Force ID: 78291.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2012-3338
📖 Read
via "National Vulnerability Database".
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to bypass security restrictions, caused by improper restrictions on the create new user account functionality. An attacker could exploit this vulnerability to create unprivileged user accounts. IBM X-Force ID: 78286.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2012-3337
📖 Read
via "National Vulnerability Database".
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 could allow a remote attacker to traverse directories on the system. An attacker could send a specially-crafted URL request containing "dot dot" sequences (/../) to download arbitrary files on the system. IBM X-Force ID: 78284.📖 Read
via "National Vulnerability Database".
ATENTION‼ New - CVE-2012-3336
📖 Read
via "National Vulnerability Database".
IBM InfoSphere Guardium 8.0, 8.01, and 8.2 is vulnerable to SQL injection. A remote authenticated attacker could send specially-crafted SQL statements to multiple scripts, which could allow the attacker to view, add, modify or delete information in the back-end database. IBM X-Force ID: 78282.📖 Read
via "National Vulnerability Database".
🕴 New APT Pioneer Kitten Linked to Iranian Government 🕴
📖 Read
via "Dark Reading: ".
The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.📖 Read
via "Dark Reading: ".
Dark Reading
New APT Pioneer Kitten Linked to Iranian Government
The group's targets have primarily been North American and Israeli entities, with a focus on technology, government, defense, and healthcare.
🕴 Apple Signs Shlayer, Legitimizes Malware 🕴
📖 Read
via "Dark Reading: ".
Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.📖 Read
via "Dark Reading: ".
Dark Reading
Apple Signs Shlayer, Legitimizes Malware
Shlayer, a common macOS Trojan, received Apple's notary certification and place in the App Store -- twice.
❌ Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws ❌
📖 Read
via "Threatpost".
Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.📖 Read
via "Threatpost".
Threat Post
Magento Sites Vulnerable to RCE Stemming From Magmi Plugin Flaws
Two flaws - one of them yet to be fixed - are afflicting a third-party plugin used by Magento e-commerce websites.
🕴 Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats 🕴
📖 Read
via "Dark Reading: ".
Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.📖 Read
via "Dark Reading: ".
Dark Reading
Anti-Phishing Startup Pixm Aims to Hook Browser-Based Threats
Pixm visually analyzes phishing websites from a human perspective to detect malicious pages people might otherwise miss.
🕴 New Threat Activity by Lazarus Group Spells Trouble For Orgs 🕴
📖 Read
via "Dark Reading: ".
The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.📖 Read
via "Dark Reading: ".
Dark Reading
New Threat Activity by Lazarus Group Spells Trouble For Orgs
The North Korea-backed group has launched several campaigns to raise revenue for cash-strapped nation's missile program, security experts say.
❌ Chinese APT Debuts Sepulcher Malware in Spear-Phishing Attacks ❌
📖 Read
via "Threatpost".
The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.📖 Read
via "Threatpost".
Threat Post
China-based APT Debuts Sepulcher Malware in Spear-Phishing Attacks
The RAT has been distributed in various campaigns over the past six months, targeting both European officials and Tibetan dissidents.
❌ Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers ❌
📖 Read
via "Threatpost".
Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.📖 Read
via "Threatpost".
Threat Post
Cisco Warns of Active Exploitation of Flaw in Carrier-Grade Routers
Multiple flaws in system software that causes errors in packet handling could allow an attacker to consume memory and crash devices.
❌ Live Webinar: XDR and Beyond ❌
📖 Read
via "Threatpost".
Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies📖 Read
via "Threatpost".
Threat Post
Live Webinar: XDR and Beyond
Next week, Senior Analyst Dave Gruber of ESG will join cybersecurity company Cynet for a webinar to help companies better understand the promise and realities of emerging XDR technologies
⚠ Phishing scam uses Sharepoint and One Note to go after passwords ⚠
📖 Read
via "Naked Security".
Not all phishing links appear right in the email itself...📖 Read
via "Naked Security".
Sophos News
Naked Security – Sophos News
🕴 Hypothesis: Cyber Attackers Are After Your Scientific Research 🕴
📖 Read
via "Dark Reading: ".
From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.📖 Read
via "Dark Reading: ".
Dark Reading
Hypothesis: Cyber Attackers Are After Your Scientific Research
From COVID-19 treatment to academic studies, keeping research secure is more important than ever. The ResearchSOC at Indiana University intends to help.
🕴 Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them) 🕴
📖 Read
via "Dark Reading: ".
By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.📖 Read
via "Dark Reading: ".
Dark Reading
Why Kubernetes Clusters Are Intrinsically Insecure (& What to Do About Them)
By following best practices and prioritizing critical issues, you can reduce the chances of a security breach and constrain the blast radius of an attempted attack. Here's how.
🔐 33% of companies expose unsafe network services to the internet 🔐
📖 Read
via "Security on TechRepublic".
The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.📖 Read
via "Security on TechRepublic".
TechRepublic
33% of companies expose unsafe network services to the internet
The findings of a new report validate the correlation between poor network hygiene and the prevalence of wider security issues in the digital supply chain.
🔐 How insider threats pose risks and challenges to any organization 🔐
📖 Read
via "Security on TechRepublic".
Insider threats can be difficult to combat and manage due to budgetary limits, lack of staff, and insufficient tools, says Bitglass.📖 Read
via "Security on TechRepublic".
TechRepublic
How insider threats pose risks and challenges to any organization
Insider threats can be difficult to combat and manage due to budgetary limits, lack of staff, and insufficient tools, says Bitglass.
🕴 DHS Partners with Industry to Offer State, Local Gov'ts Cybersecurity Aid 🕴
📖 Read
via "Dark Reading: ".
The US Department of Homeland Security teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.📖 Read
via "Dark Reading: ".
Dark Reading
DHS Partners with Industry to Offer State, Local Gov'ts Cybersecurity Aid
The US Department of Homeland Security teams up with Akamai and the Center for Internet Security to provide state and local governments with cybersecurity through DNS for free.
🕴 5 Tips for Triaging Risk from Exposed Credentials 🕴
📖 Read
via "Dark Reading: ".
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.📖 Read
via "Dark Reading: ".
Dark Reading
5 Tips for Triaging Risk from Exposed Credentials
Not all exposed usernames and passwords present a threat. Here's how to quickly identify the ones that do.
🔐 How to enable end-to-end encryption for the Nextcloud app 🔐
📖 Read
via "Security on TechRepublic".
Learn how you can enable the new Nextcloud end-to-end encryption.📖 Read
via "Security on TechRepublic".
TechRepublic
How to enable end-to-end encryption for the Nextcloud app
Learn how you can enable the new Nextcloud end-to-end encryption.