β Ep. 028 β SPEWS, Android security and scary Facebook messages [PODCAST] β
π Read
via "Naked Security".
Here's the latest Naked Security podcast - enjoy!π Read
via "Naked Security".
Naked Security
Ep. 028 β SPEWS, Android security and scary Facebook messages [PODCAST]
Hereβs the latest Naked Security podcast β enjoy!
π How to monitor file changes with fswatch π
π Read
via "Security on TechRepublic".
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.π Read
via "Security on TechRepublic".
TechRepublic
How to monitor file changes with fswatch
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.
π How to monitor file changes with fswatch π
π Read
via "Security on TechRepublic".
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.π Read
via "Security on TechRepublic".
TechRepublic
How to monitor file changes with fswatch
Jack Wallen shows you how to install and use the directory monitor tool, fswatch.
β ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst β
π Read
via "Threatpost".
The financial services industry sees nearly half of all website traffic coming from malicious bots.π Read
via "Threatpost".
Threat Post
ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst
ThreatList: Bad Bots Account for a Fifth of All Web Traffic, FinServ Hit the Worst
ATENTIONβΌ New - CVE-2018-16561
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-300 CPUs (All versions < V3.X.16). The affected CPUs improperly validate S7 communication packets which could cause a Denial-of-Service condition of the CPU. The CPU will remain in DEFECT mode until manual restart. Successful exploitation requires an attacker to be able to send a specially crafted S7 communication packet to a communication interface of the CPU. This includes Ethernet, PROFIBUS, and Multi Point Interfaces (MPI). No user interaction or privileges are required to exploit the security vulnerability. The vulnerability could allow causing a Denial-of-Service condition of the core functionality of the CPU, compromising the availability of the system. At the time of advisory publication no public exploitation of this security vulnerability was known. Siemens confirms the security vulnerability and provides mitigations to resolve the security issue.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16559
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-16558
π Read
via "National Vulnerability Database".
A vulnerability has been identified in SIMATIC S7-1500 CPU (All versions >= V2.0 and < V2.5), SIMATIC S7-1500 CPU (All versions <= V1.8.5). Specially crafted network packets sent to port 80/tcp or 443/tcp could allow an unauthenticated remote attacker to cause a Denial-of-Service condition of the device. The security vulnerability could be exploited by an attacker with network access to the affected systems on port 80/tcp or 443/tcp. Successful exploitation requires no system privileges and no user interaction. An attacker could use the vulnerability to compromise availability of the device. At the time of advisory publication no public exploitation of this security vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13810
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated configuration web server of the affected CP devices could allow a Cross-Site Request Forgery (CSRF) attack if an unsuspecting user is tricked into accessing a malicious link. Successful exploitation requires user interaction by a legitimate user. A successful attack could allow an attacker to trigger actions via the web interface that the legitimate user is allowed to perform. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13809
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). The integrated web server of the affected CP devices could allow Cross-Site Scripting (XSS) attacks if unsuspecting users are tricked into following a malicious link. User interaction is required for a successful exploitation. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13808
π Read
via "National Vulnerability Database".
A vulnerability has been identified in CP 1604 (All versions < V2.8), CP 1616 (All versions < V2.8). An attacker with network access to port 23/tcp could extract internal communication data or cause a Denial-of-Service condition. Successful exploitation requires network access to a vulnerable device. At the time of advisory publication no public exploitation of this vulnerability was known.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-13378
π Read
via "National Vulnerability Database".
An information disclosure vulnerability in Fortinet FortiSIEM 5.2.0 and below versions exposes the LDAP server plaintext password via the HTML source code.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-10959
π Read
via "National Vulnerability Database".
Avecto Defendpoint 4 prior to 4.4 SR6 and 5 prior to 5.1 SR1 has an Untrusted Search Path vulnerability, exploitable by modifying environment variables to trigger automatic elevation of an attacker's process launch.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11430
π Read
via "National Vulnerability Database".
OmniAuth OmnitAuth-SAML 1.9.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11429
π Read
via "National Vulnerability Database".
Clever saml2-js 2.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11428
π Read
via "National Vulnerability Database".
OneLogin Ruby-SAML 1.6.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2017-11427
π Read
via "National Vulnerability Database".
OneLogin PythonSAML 2.3.0 and earlier may incorrectly utilize the results of XML DOM traversal and canonicalization APIs in such a way that an attacker may be able to manipulate the SAML data without invalidating the cryptographic signature, allowing the attack to potentially bypass authentication to SAML service providers.π Read
via "National Vulnerability Database".
β State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally β
π Read
via "Threatpost".
An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.π Read
via "Threatpost".
Threat Post
State-Sponsored DNS Hijacking Infiltrates 40 Firms Globally
An ongoing campaign, active since 2017, has been stealing credentials via global DNS hijacking attacks.
π΄ Inside the Dark Web's How-To Guides for Teaching Fraud π΄
π Read
via "Dark Reading: ".
A new study investigates nearly 30,000 guides to explore what fraudsters sell and teach aspiring cybercriminals.π Read
via "Dark Reading: ".
Darkreading
Inside the Dark Web's How-To Guides for Teaching Fraud
A new study investigates nearly 30,000 guides to explore what fraudsters sell and teach aspiring cybercriminals.
π΄ Ever-Sophisticated Bad Bots Target Healthcare, Ticketing π΄
π Read
via "Dark Reading: ".
From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.π Read
via "Dark Reading: ".
Darkreading
Ever-Sophisticated Bad Bots Target Healthcare, Ticketing
From criminals to competitors, online bots continue to scrape information from sites and pose as legitimate users.
π΄ Legacy Apps: The Security Risk Lurking in Dusty Corners π΄
π Read
via "Dark Reading: ".
Four best practices to keep old code from compromising your enterprise environment.π Read
via "Dark Reading: ".
Darkreading
Legacy Apps: The Security Risk Lurking in Dusty Corners
Four best practices to keep old code from compromising your enterprise environment.
π Homeland Security Urges Increase in Cybersecurity Spending π
π Read
via "Subscriber Blog RSS Feed ".
A standing committee of the United States House of Representatives is requesting more money to properly secure federal cybersecurity and critical infrastructure in 2020.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Homeland Security Urges Increase in Cybersecurity Spending
A standing committee of the United States House of Representatives is requesting more money to properly secure federal cybersecurity and critical infrastructure in 2020.