π Sifter 10.6m π
π Read
via "Packet Storm Security".
Sifter is a osint, recon, and vulnerability scanner. It combines a plethora of tools within different module sets in order to quickly perform recon tasks, check network firewalling, enumerate remote and local hosts, and scan for the blue vulnerabilities within Microsoft systems and if unpatched, exploits them.π Read
via "Packet Storm Security".
Packetstormsecurity
Sifter 10.6m β Packet Storm
Information Security Services, News, Files, Tools, Exploits, Advisories and Whitepapers
β VMware Issues Updated Fix For Critical ESXi Flaw β
π Read
via "Threat Post".
A previous fix for the critical remote code execution bug was "incomplete," according to VMware.π Read
via "Threat Post".
Threat Post
VMware Issues Updated Fix For Critical ESXi Flaw
A previous fix for the critical remote code execution bug was "incomplete," according to VMware.
β Toymaker Mattel Hit by Ransomware Attack β
π Read
via "Threat Post".
Financial disclosure filings describe a ransomware attack that delivered a weak punch.π Read
via "Threat Post".
Threat Post
Toymaker Mattel Hit by Ransomware Attack
Financial disclosure filings describe a ransomware attack that delivered weak punch.
π΄ Containers for Data Analysis Are Rife With Vulnerabilities π΄
π Read
via "Dark Reading".
Old software components and the inclusion of unnecessary code created a massive attack surface area in containers for scientific analysis, researchers say.π Read
via "Dark Reading".
Dark Reading
Containers for Data Analysis Are Rife With Vulnerabilities
Old software components and the inclusion of unnecessary code created a massive attack surface area in containers for scientific analysis, researchers say.
βΌ CVE-2020-2314 βΌ
π Read
via "National Vulnerability Database".
Jenkins AppSpider Plugin 1.0.12 and earlier stores a password unencrypted in its global configuration file on the Jenkins controller where it can be viewed by users with access to the Jenkins controller file system.π Read
via "National Vulnerability Database".
π΄ Prepare for the Unexpected: Costs to Consider in Security Budgets π΄
π Read
via "Dark Reading".
Organizations that update business models to include cybersecurity as part of a strategic planning process may be able to better withstand unexpected disruptions.π Read
via "Dark Reading".
Dark Reading
Prepare for the Unexpected: Costs to Consider in Security Budgets
Organizations that update business models to include cybersecurity as part of a strategic planning process may be able to better withstand unexpected disruptions.
π Logistics Firm Claims Former Exec Took Secrets to Start New Firm π
π Read
via "Digital Guardian".
This US logistics company claims a former board member stole company secrets to set up his own competitor.π Read
via "Digital Guardian".
Digital Guardian
Logistics Firm Claims Former Exec Took Secrets to Start New Firm
This US logistics company claims a former board member stole company secrets to set up his own competitor.
βΌ CVE-2020-22274 βΌ
π Read
via "National Vulnerability Database".
JomSocial (Joomla Social Network Extention) 4.7.6 allows CSV injection via a customer's profile.π Read
via "National Vulnerability Database".
βΌ CVE-2020-22273 βΌ
π Read
via "National Vulnerability Database".
Neoflex Video Subscription System Version 2.0 is affected by CSRF which allows the Website's Settings to be changed (such as Payment Settings)π Read
via "National Vulnerability Database".
βΌ CVE-2020-22276 βΌ
π Read
via "National Vulnerability Database".
WeForms Wordpress Plugin 1.4.7 allows CSV injection via a form's entry.π Read
via "National Vulnerability Database".
βΌ CVE-2020-22278 βΌ
π Read
via "National Vulnerability Database".
phpMyAdmin through 5.0.2 allows CSV injection via Export Sectionπ Read
via "National Vulnerability Database".
βΌ CVE-2020-22275 βΌ
π Read
via "National Vulnerability Database".
Easy Registration Forms (ER Forms) Wordpress Plugin 2.0.6 allows an attacker to submit an entry with malicious CSV commands. After that, when the system administrator generates CSV output from the forms information, there is no check on this inputs and the codes are executable.π Read
via "National Vulnerability Database".
βΌ CVE-2020-8036 βΌ
π Read
via "National Vulnerability Database".
The tok2strbuf() function in tcpdump 4.10.0-PRE-GIT was used by the SOME/IP dissector in an unsafe way.π Read
via "National Vulnerability Database".
π΄ Hexagon Announces Deal to Acquire PAS Global π΄
π Read
via "Dark Reading".
The Houston-based PAS Global will operate as part of Hexagon's PPM (formerly Intergraph Process, Power & Marine) division.π Read
via "Dark Reading".
Dark Reading
Hexagon Announces Deal to Acquire PAS Global
The Houston-based PAS Global will operate as part of Hexagon's PPM (formerly Intergraph Process, Power & Marine) division.
π¦Ώ What's happening today: The election and online spending π¦Ώ
π Read
via "Tech Republic".
As Americans anxiously await clarity regarding final voting counts and results of yesterday's election, a new report found 26% of US consumers correlate who will win with how much they'll spend.π Read
via "Tech Republic".
TechRepublic
What's happening today: The election and online spending
As Americans anxiously await clarity regarding final voting counts and results of yesterday's election, a new report found 26% of US consumers correlate who will win with how much they'll spend.
βΌ CVE-2020-7128 βΌ
π Read
via "National Vulnerability Database".
A remote unauthenticated arbitrary code execution vulnerability was discovered in Aruba Airwave Software version(s): Prior to 1.3.2.π Read
via "National Vulnerability Database".
βΌ CVE-2020-28049 βΌ
π Read
via "National Vulnerability Database".
An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation.π Read
via "National Vulnerability Database".
β Google Forms Abused to Phish AT&T Credentials β
π Read
via "Threat Post".
More than 200 Google Forms impersonate top brands - including Microsoft OneDrive, Office 365, and Wells Fargo - to steal victims' credentials.π Read
via "Threat Post".
Threat Post
Google Forms Abused to Phish AT&T Credentials
More than 200 Google Forms impersonate top brands - including Microsoft OneDrive, Office 365, and Wells Fargo - to steal victims' credentials.
β GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers β
π Read
via "Threat Post".
Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many from countries where pot is illegal.π Read
via "Threat Post".
Threat Post
GrowDiaries Exposes Emails, Passwords of 1.4M Cannabis Growers
Cannabis journaling platform GrowDiaries exposed more than 3.4 million user records online, many from countries where pot is illegal.
β Mysterious APT Leaves Curious βKilllSomeOneβ Clue β
π Read
via "Threat Post".
APT cloaks identity using script-kiddie messages and advanced deployment and targeting techniques.π Read
via "Threat Post".
Threat Post
Mysterious APT Leaves Curious βKilllSomeOneβ Clue
APT cloaks identity using script-kiddie messages and advanced deployment and targeting techniques.
π΄ Disinformation Now the Top Concern Following Hack-Free Election Day π΄
π Read
via "Dark Reading".
After an Election Day without foreign interference and cyberattacks, security experts turn their focus to disinformation.π Read
via "Dark Reading".
Dark Reading
Disinformation Now the Top Concern Following Hack-Free Election Day
After an Election Day without foreign interference and cyberattacks, security experts turn their focus to disinformation.