π΄ Selecting the Right Strategy to Reduce Vulnerability Risk π΄
π Read
via "Dark Reading: ".
There's no one-size-fits-all strategy for eliminating vulnerability risk. Knowing how your organization operates is what makes the difference.π Read
via "Dark Reading: ".
Darkreading
Selecting the Right Strategy to Reduce Vulnerability Risk
There's no one-size-fits-all strategy for eliminating vulnerability risk. Knowing how your organization operates is what makes the difference.
π Two-factor authentication: A cheat sheet π
π Read
via "Security on TechRepublic".
A password alone will not protect sensitive information from hackers--two-factor authentication is also necessary. Here's what security pros and users need to know about two-factor authentication.π Read
via "Security on TechRepublic".
TechRepublic
Two-factor authentication: A cheat sheet
A password alone will not protect sensitive information from hackers--two-factor authentication is also necessary. Here's what security pros and users need to know about two-factor authentication.
β Ep. 028 β SPEWS, Android security and scary Facebook messages [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - enjoy!π Read
via "Naked Security".
Naked Security
Ep. 028 β SPEWS, Android security and scary Facebook messages [PODCAST]
Hereβs the latest Naked Security podcast β enjoy!
π How to monitor file changes with fswatch π
π Read
via "Security on TechRepublic".
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.π Read
via "Security on TechRepublic".
TechRepublic
How to monitor file changes with fswatch
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.
π How to monitor file changes with fswatch π
π Read
via "Security on TechRepublic".
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.π Read
via "Security on TechRepublic".
TechRepublic
How to monitor file changes with fswatch
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.
β ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst β
π Read
via "Threatpost".
The financial services industry sees nearly half of all website traffic coming from malicious bots.π Read
via "Threatpost".
Threat Post
ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst
ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst
ATENTIONβΌ New - CVE-2018-16561
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16559
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16558
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13810
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13809
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated web server of the affected CP devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into following a malicious link. User interaction is required for a successful exploitation. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13808
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13378
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-10959
π Read
via "National Vulnerability Database".
Avecto Defendpoint 4 prior to 4.4 SR6 and 5 prior to 5.1 SR1 has an Untrusted Search Path vulnerability, exploitable by modifying environment variables to trigger automatic elevation of an attacker's process launch.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11430
π Read
via "National Vulnerability Database".
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11429
π Read
via "National Vulnerability Database".
Clever saml2-js 2.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11428
π Read
via "National Vulnerability Database".
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11427
π Read
via "National Vulnerability Database".
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
β State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally β
π Read
via "Threatpost".
An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.π Read
via "Threatpost".
Threat Post
State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally
An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.
π΄ Inside the Dark Web's How-To Guides for Teaching Fraud π΄
π Read
via "Dark Reading: ".
A new study investigates nearly 30,000 guides to explore what fraudsters sell and teach aspiring cybercriminals.π Read
via "Dark Reading: ".
Darkreading
Inside the Dark Web's How-To Guides for Teaching Fraud
A new study investigates nearly 30,000 guides to explore what fraudsters sell and teach aspiring cybercriminals.
π΄ Ever-Sophisticated Bad Bots Target Healthcare, Ticketing π΄
π Read
via "Dark Reading: ".
From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.π Read
via "Dark Reading: ".
Darkreading
Ever-Sophisticated Bad Bots Target Healthcare, Ticketing
From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.