π΄ Keeping Your Organization Secure When Dealing With the Unexpected π΄
π Read
via "Dark Reading".
There's no way to anticipate every possible scenario, but the right approach to business continuity can help you respond effectively in any situation.π Read
via "Dark Reading".
β Ransomware Poll: 80% of Victims Donβt Pay Up β
π Read
via "Threat Post".
Meanwhile, in a separate survey, 80 percent of organizations that paid the ransom said were hit by a second attack.π Read
via "Threat Post".
Threat Post
Exclusive Ransomware Poll: 80% of Victims Donβt Pay Up
Meanwhile, in a separate survey, 80 percent of organizations that paid the ransom said they were hit by a second attack.
π΄ Is an Attacker Living Off Your Land? π΄
π Read
via "Dark Reading".
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.π Read
via "Dark Reading".
Dark Reading
Is an Attacker Living Off Your Land?
Living-off-the-land attacks pose significant risks to organizations and, on top of that, are difficult to detect. Learn the basics about how these attacks operate and ways to limit their damage.
βΌ CVE-2020-20444 βΌ
π Read
via "National Vulnerability Database".
Jact OpenClinic 0.8.20160412 allows the attacker to read server files after login to the the admin account by an infected 'file' GET parameter in '/shared/view_source.php' which "could" lead to RCE vulnerability .π Read
via "National Vulnerability Database".
βΌ CVE-2020-22199 βΌ
π Read
via "National Vulnerability Database".
SQL Injection vulnerability in phpCMS 2007 SP6 build 0805 via the digg_mod parameter to digg_add.php.π Read
via "National Vulnerability Database".
β IKEA Fined $1.2M for Elaborate βSpying Systemβ β
π Read
via "Threat Post".
A French court fined the furniture giant for illegal surveillance on 400 customers and staff.π Read
via "Threat Post".
Threat Post
IKEA Fined $1.2M for Elaborate βSpying Systemβ
A French court fined the furniture giant for illegal surveillance on 400 customers and staff.
π΄ Russian National Convicted on Charges Related to Kelihos Botnet π΄
π Read
via "Dark Reading".
Oleg Koshkin was arrested in 2019 and faces a maximum penalty of 15 years in prison, the DoJ reports.π Read
via "Dark Reading".
π΄ Security Flaw Discovered In Peloton Equipment π΄
π Read
via "Dark Reading".
The vulnerability could give attackers remote root access to the bike's tablet, researchers report.π Read
via "Dark Reading".
π΄ Biden Tells Putin Critical Infrastructure Sectors 'Off Limits' to Russian Hacking π΄
π Read
via "Dark Reading".
President Joe Biden said he and Russian President Vladimir Putin agreed to discuss boundaries in cyber activity.π Read
via "Dark Reading".
βΌ CVE-2021-1568 βΌ
π Read
via "National Vulnerability Database".
A vulnerability in Cisco AnyConnect Secure Mobility Client for Windows could allow an authenticated, local attacker to cause a denial of service (DoS) condition on an affected system. This vulnerability is due to uncontrolled memory allocation. An attacker could exploit this vulnerability by copying a crafted file to a specific folder on the system. A successful exploit could allow the attacker to crash the VPN Agent service when the affected application is launched, causing it to be unavailable to all users of the system. To exploit this vulnerability, the attacker must have valid credentials on a multiuser Windows system.π Read
via "National Vulnerability Database".
βΌ CVE-2021-1541 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in the web-based management interface of Cisco Small Business 220 Series Smart Switches could allow an attacker to do the following: Hijack a user session Execute arbitrary commands as a root user on the underlying operating system Conduct a cross-site scripting (XSS) attack Conduct an HTML injection attack For more information about these vulnerabilities, see the Details section of this advisory.π Read
via "National Vulnerability Database".
π΄ Ransomware Operators' Strategies Evolve as Attacks Rise π΄
π Read
via "Dark Reading".
Security researchers find ransomware operators rely less on email and more on criminal groups for initial access into target networks.π Read
via "Dark Reading".
π΄ Ukraine Police Disrupt Cl0p Ransomware Operation π΄
π Read
via "Dark Reading".
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.π Read
via "Dark Reading".
Dark Reading
Ukraine Police Disrupt Cl0p Ransomware Operation
Growing list of similar actions in recent months may finally be scaring some operators into quitting, but threat is far from over, security experts say.
βΌ CVE-2021-34201 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-2640-US 1.01B04 is vulnerable to Buffer Overflow. There are multiple out-of-bounds vulnerabilities in some processes of D-Link AC2600(DIR-2640). Local ordinary users can overwrite the global variables in the .bss section, causing the process crashes or changes.π Read
via "National Vulnerability Database".
βΌ CVE-2021-34204 βΌ
π Read
via "National Vulnerability Database".
D-Link DIR-2640-US 1.01B04 is affected by Insufficiently Protected Credentials. D-Link AC2600(DIR-2640) stores the device system account password in plain text. It does not use linux user management. In addition, the passwords of all devices are the same, and they cannot be modified by normal users. An attacker can easily log in to the target router through the serial port and obtain root privileges.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32243 βΌ
π Read
via "National Vulnerability Database".
FOGProject v1.5.9 is affected by a File Upload RCE (Authenticated).π Read
via "National Vulnerability Database".
β How to hack a bicycle β Peloton Bike+ rooting bug patched β
π Read
via "Naked Security".
It's a bike, Jim, but not as we know it.π Read
via "Naked Security".
Naked Security
How to hack a bicycle β Peloton Bike+ rooting bug patched
Itβs a bike, Jim, but not as we know it.
βΌ CVE-2021-31476 βΌ
π Read
via "National Vulnerability Database".
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit PhantomPDF 10.1.3.37598. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handling of XFA templates. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-13531.π Read
via "National Vulnerability Database".
βΌ CVE-2021-21777 βΌ
π Read
via "National Vulnerability Database".
An information disclosure vulnerability exists in the Ethernet/IP UDP handler functionality of EIP Stack Group OpENer 2.3 and development commit 8c73bf3. A specially crafted network request can lead to an out-of-bounds read.π Read
via "National Vulnerability Database".
β Threat Actors Use Google Docs to Host Phishing Attacks β
π Read
via "Threat Post".
Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials.π Read
via "Threat Post".
Threat Post
Threat Actors Use Google Docs to Host Phishing Attacks
Exploit in the widely used document service leveraged to send malicious links that appear legitimate but actually steal victims credentials.
β S3 Ep37: Quantum crypto, refunding Bitcoins, and Alpaca problems [Podcast] β
π Read
via "Naked Security".
Latest episode - listen now!π Read
via "Naked Security".
Naked Security
S3 Ep37: Quantum crypto, refunding Bitcoins, and Alpaca problems [Podcast]
Latest episode β listen now!