β Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign β
π Read
via "Threat Post".
A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.π Read
via "Threat Post".
Threat Post
Oil & Gas Targeted in Year-Long Cyber-Espionage Campaign
A global effort to steal information from energy companies is using sophisticated social engineering to deliver Agent Tesla and other RATs.
βΌ CVE-2020-20363 βΌ
π Read
via "National Vulnerability Database".
Crossi Site Scripting (XSS) vulnerability in PbootCMS 2.0.3 in admin.php.π Read
via "National Vulnerability Database".
βΌ CVE-2021-1596 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Video Surveillance 7000 Series IP Cameras could allow an unauthenticated, adjacent attacker to cause a memory leak, which could lead to a denial of service (DoS) condition on an affected device. These vulnerabilities are due to incorrect processing of certain LLDP packets at ingress time. An attacker could exploit these vulnerabilities by sending crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to continuously consume memory, which could cause the device to crash and reload, resulting in a DoS condition. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent).π Read
via "National Vulnerability Database".
βΌ CVE-2021-1603 βΌ
π Read
via "National Vulnerability Database".
Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user. These vulnerabilities exist because the web-based management interface does not sufficiently validate user-supplied input. An attacker could exploit these vulnerabilities by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker would need valid administrative credentials.π Read
via "National Vulnerability Database".
π CEO, COO Indicted in Biotech IP Theft Caseβs Latest Turn π
π Read
via "".
Two executives reportedly used stolen intellectual property to build their company up to a nearly $1 billion valuation, the DOJ announced this week.π Read
via "".
π΄ Morgan Stanley Discloses Data Breach π΄
π Read
via "Dark Reading".
Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.π Read
via "Dark Reading".
Dark Reading
Morgan Stanley Discloses Data Breach
Attackers were able to compromise customers' personal data by targeting the Accellion FTA server of a third-party vendor.
βΌ CVE-2021-34613 βΌ
π Read
via "National Vulnerability Database".
A remote arbitrary command execution vulnerability was discovered in Aruba ClearPass Policy Manager version(s): Prior to 6.10.0, 6.9.6 and 6.8.9. Aruba has released updates to ClearPass Policy Manager that address this security vulnerability.π Read
via "National Vulnerability Database".
β Lazarus Targets Job-Seeking Engineers with Malicious Documents β
π Read
via "Threat Post".
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.π Read
via "Threat Post".
Threat Post
Lazarus Targets Job-Seeking Engineers with Malicious Documents
Notorious North Korean APT impersonates Airbus, General Motors and Rheinmetall to lure potential victims into downloading malware.
βΌ CVE-2021-3570 βΌ
π Read
via "National Vulnerability Database".
A flaw was found in the ptp4l program of the linuxptp package. A missing length check when forwarding a PTP message between ports allows a remote attacker to cause an information leak, crash, or potentially remote code execution. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability. This flaw affects linuxptp versions before 3.1.1, before 2.0.1, before 1.9.3, before 1.8.1, before 1.7.1, before 1.6.1 and before 1.5.1.π Read
via "National Vulnerability Database".
π Friday Five 7/9 π
π Read
via "".
Ransomware negotiators, cyber risks to the financial system, and why traditional passwords are here to stay - catch up on all of the week's infosec news with the Friday Five!π Read
via "".
Digital Guardian
Friday Five 7/9
Ransomware negotiators, cyber risks to the financial system, and why traditional passwords are here to stay - catch up on all of the week's infosec news with the Friday Five!
π΄ Cartoon Caption Winner: Sight Unseen π΄
π Read
via "Dark Reading".
And the winner of Dark Reading's June contest is ...π Read
via "Dark Reading".
Dark Reading
Cartoon Caption Winner: Sight Unseen
And the winner of Dark Reading's June contest is ...
βΌ CVE-2012-5632 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
βΌ CVE-2012-0832 βΌ
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Notes: none.π Read
via "National Vulnerability Database".
π΄ It's in the Game (but It Shouldn't Be) π΄
π Read
via "Dark Reading".
Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.π Read
via "Dark Reading".
Darkreading
It's in the Game (but It Shouldn't Be)
Five ways that game developers (and others) can avoid falling victim to an attack like the one that hit EA.
π¦Ώ Warning: 1 in 3 employees are likely to fall for a phishing scam π¦Ώ
π Read
via "Tech Republic".
Cybersecurity training company KnowBe4 reports that the number of employees likely to fall for phishing emails drops dramatically with proper instruction on how to recognize an attack.π Read
via "Tech Republic".
TechRepublic
Warning: 1 in 3 employees are likely to fall for a phishing scam
Cybersecurity training company KnowBe4 reports that the number of employees likely to fall for phishing emails drops dramatically with proper instruction on how to recognize an attack.
βΌ CVE-2021-27035 βΌ
π Read
via "National Vulnerability Database".
A maliciously crafted TIFF, PDF, PICT or DWF files in Autodesk 2018, 2017, 2013, 2012, 2011 can be forced to read beyond allocated boundaries when parsing the TIFF, PDF, PICT or DWF files. This vulnerability can be exploited to execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-27036 βΌ
π Read
via "National Vulnerability Database".
A maliciously crafted PDF, PICT or TIFF file can be used to write beyond the allocated buffer while parsing PDF, PICT or TIFF files in Autodesk 2018, 2017, 2013, 2012, 2011. This vulnerability can be exploited to execute arbitrary code.π Read
via "National Vulnerability Database".
βΌ CVE-2021-30117 βΌ
π Read
via "National Vulnerability Database".
SQL injection exists in Kaseya VSA before 9.5.6.π Read
via "National Vulnerability Database".
βΌ CVE-2021-32752 βΌ
π Read
via "National Vulnerability Database".
Ether Logs is a package that allows one to check one's logs in the Craft 3 utilities section. A vulnerability was found in versions prior to 3.0.4 that allowed authenticated admin users to access any file on the server. The vulnerability has been fixed in version 3.0.4. As a workaround, one may disable the plugin if untrustworthy sources have admin access.π Read
via "National Vulnerability Database".
β Where do all those cybercrime payments go? β
π Read
via "Naked Security".
Yes, the headline is a rhetorical question. But sometimes we get literal answers, and they're well worth remembering.π Read
via "Naked Security".
Naked Security
Where do all those cybercrime payments go?
Yes, the headline is a rhetorical question. But sometimes we get literal answers, and theyβre well worth remembering.
π¦Ώ More sharing, less shame: CompTIA ISAO wants to change the standard response to ransomware attacks π¦Ώ
π Read
via "Tech Republic".
The information sharing organization helps companies deal with security threats and supports more collaboration overall.π Read
via "Tech Republic".
TechRepublic
More sharing, less shame: CompTIA ISAO wants to change the standard response to ransomware attacks
The information sharing organization helps companies deal with security threats and supports more collaboration overall.