β Magecart Returns with Advertising Library Tactic β
π Read
via "Threatpost | The first stop for security news".
The threat group also has a new subsidiary, Magecart Group 12.π Read
via "Threatpost | The first stop for security news".
Threat Post
Magecart Returns with Advertising Library Tactic
The threat group also has a new subsidiary, Magecart Group 12.
π Top 10 app vulnerabilities: Unpatched plugins and extensions dominate π
π Read
via "Security on TechRepublic".
Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.π Read
via "Security on TechRepublic".
TechRepublic
Top 10 app vulnerabilities: Unpatched plugins and extensions dominate
Despite the existence of patches, the proliferation of unpatched installations are enticing targets for malicious actors, according to a WhiteHat report.
π΄ Triton/Trisis Attack Was More Widespread Than Publicly Known π΄
π Read
via "Dark Reading: ".
Signs of the attack first showed up two months before it was identified as a cyberattack, but they were mistaken for a pure equipment failure by Schneider Electric, security expert reveals at S4x19.π Read
via "Dark Reading: ".
Darkreading
Triton/Trisis Attack Was More Widespread Than Publicly Known
Signs of the attack first showed up two months before it was identified as a cyberattack, but they were mistaken for a pure equipment failure by Schneider Electric, security expert reveals at S4x19.
ATENTIONβΌ New - CVE-2016-9651 (chrome, enterprise_linux_desktop, enterprise_linux_server, enterprise_linux_workstation)
π Read
via "National Vulnerability Database".
A missing check for whether a property of a JS object is private in V8 in Google Chrome prior to 55.0.2883.75 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.π Read
via "National Vulnerability Database".
β Fortnite Hacked Via Insecure Single Sign-On β
π Read
via "Threatpost | The first stop for security news".
Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts.π Read
via "Threatpost | The first stop for security news".
Threat Post
Fortnite Hacked Via Insecure Single Sign-On
Leaky Fortnite single sign-on mechanism could have allowed hackers to access game accounts.
π΄ Are You Listening to Your Kill Chain? π΄
π Read
via "Dark Reading: ".
With the right tools and trained staff, any organization should be able to deal with threats before information is compromised.π Read
via "Dark Reading: ".
Darkreading
Are You Listening to Your Kill Chain?
With the right tools and trained staff, any organization should be able to deal with threats before information is compromised.
β U.S. Issues Multiple Charges For 2016 SEC Hack β
π Read
via "Threatpost | The first stop for security news".
The two were able to hack into the SEC's computer systems due to phishing attacks that stole credentials and spread malware.π Read
via "Threatpost | The first stop for security news".
Threat Post
U.S. Issues Multiple Charges For 2016 SEC Hack
The two were able to hack into the SEC's computer systems due to phishing attacks that stole credentials and spread malware.
π To stay competitive, MSSPs need to grow and evolve π
π Read
via "Security on TechRepublic".
βManaged Security Service Providers can alleviate many of the headaches suffered by in-house security, but they need to remain nimble and focused to retain their edge.π Read
via "Security on TechRepublic".
TechRepublic
To stay competitive, MSSPs need to grow and evolve
βManaged Security Service Providers can alleviate many of the headaches suffered by in-house security, but they need to remain nimble and focused to retain their edge.
π΄ Fortnite Players at Risk Via Epic Games Vulnerability π΄
π Read
via "Dark Reading: ".
Bugs in Epic Games' platform could let intruders take over players' accounts, view personal data, and/or buy in-game currency.π Read
via "Dark Reading: ".
Darkreading
Fortnite Players Compromised Via Epic Games Vulnerability
Bugs in Epic Games' platform could let intruders take over players' accounts, view personal data, and/or buy in-game currency.
ATENTIONβΌ New - CVE-2015-9280
π Read
via "National Vulnerability Database".
MailEnable before 8.60 allows XXE via an XML document in the request.aspx Options parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9279
π Read
via "National Vulnerability Database".
MailEnable before 8.60 allows Stored XSS via malformed use of "<img/src" with no ">" character in the body of an e-mail message.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9278
π Read
via "National Vulnerability Database".
MailEnable before 8.60 allows Privilege Escalation because admin accounts could be created as a consequence of %0A mishandling in AUTH.TAB after a password-change request.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9277
π Read
via "National Vulnerability Database".
MailEnable before 8.60 allows Directory Traversal for reading the messages of other users, uploading files, and deleting files because "/../" and "/.. /" are mishandled.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2015-9276
π Read
via "National Vulnerability Database".
SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2016-10403 (chrome)
π Read
via "National Vulnerability Database".
Insufficient data validation on image data in PDFium in Google Chrome prior to 51.0.2704.63 allowed a remote attacker to perform an out of bounds memory read via a crafted PDF file.π Read
via "National Vulnerability Database".
π΄ BEC Groups Ramp Up Payroll Diversion Attacks π΄
π Read
via "Dark Reading: ".
Criminals are increasingly trying to defraud businesses by diverting payrolls of CEOs, other senior executives, Agari says.π Read
via "Dark Reading: ".
Darkreading
BEC Groups Ramp Up Payroll Diversion Attacks
Criminals are increasingly trying to defraud businesses by diverting payrolls of CEOs, other senior executives, Agari says.
π΄ How the US Chooses Which Zero-Day Vulnerabilities to Stockpile π΄
π Read
via "Dark Reading: ".
When it comes to acceptable circumstances for government disclosure of zero-days, the new Vulnerabilities Equity Process might be the accountability practice security advocates have been waiting for.π Read
via "Dark Reading: ".
Darkreading
How the US Chooses Which Zero-Day Vulnerabilities to Stockpile
When it comes to acceptable circumstances for government disclosure of zero-days, the new Vulnerabilities Equity Process might be the accountability practice security advocates have been waiting for.
β Millions of Oklahoma Gov Files Exposed by Wide-Open Server β
π Read
via "Threatpost | The first stop for security news".
The storage server was left open for about a week and exposed everything from sensitive FBI investigations to data related to patients with AIDS.π Read
via "Threatpost | The first stop for security news".
Threat Post
Millions of Oklahoma Gov Files Exposed by Wide-Open Server
The storage server was left open for about a week and exposed everything from sensitive FBI investigations to data related to people with AIDS.
π΄ Fortnite Players at Risk Via Epic Games Vulnerability π΄
π Read
via "Dark Reading: ".
Bugs in Epic Games' platform could let intruders take over players' accounts, view personal data, and/or buy in-game currency.π Read
via "Dark Reading: ".
Darkreading
Fortnite Players Compromised Via Epic Games Vulnerability
Bugs in Epic Games' platform could let intruders take over players' accounts, view personal data, and/or buy in-game currency.
ATENTIONβΌ New - CVE-2017-3137
π Read
via "National Vulnerability Database".
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0-P3, 9.11.1b1->9.11.1rc1, and 9.9.9-S8.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-3136
π Read
via "National Vulnerability Database".
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.π Read
via "National Vulnerability Database".