ATENTIONβΌ New - CVE-2018-21014
π Read
via "National Vulnerability Database".
The buddyboss-media plugin through 3.2.3 for WordPress has stored XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21013
π Read
via "National Vulnerability Database".
The Swape theme before 1.2.1 for WordPress has incorrect access control, as demonstrated by allowing new administrator accounts via vectors involving xmlPath to wp-admin/admin-ajax.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21012
π Read
via "National Vulnerability Database".
The cf7-invisible-recaptcha plugin before 1.3.2 for WordPress has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2018-21011
π Read
via "National Vulnerability Database".
The charitable plugin before 1.5.14 for WordPress has unauthorized access to user and donation details.π Read
via "National Vulnerability Database".
π΄ Just A Few Questions Before That Bank Withdrawal ... π΄
π Read
via "Dark Reading: ".
And be ready to turn over your first born.π Read
via "Dark Reading: ".
Dark Reading
Just A Few Questions Before That Bank Withdrawal ...
And be ready to turn over your first born.
π Millions of Exim Servers Vulnerable to Remote Code Execution Vulnerability π
π Read
via "Subscriber Blog RSS Feed ".
A critical vulnerability in Exim, by far the world's most popular email server, was disclosed on Friday.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Millions of Exim Servers Vulnerable to Remote Code Execution Vulnerability
A critical vulnerability in Exim, by far the world's most popular email server, was disclosed on Friday.
β Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks β
π Read
via "Threatpost".
Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted - and connected - DDoS attacks.π Read
via "Threatpost".
Threat Post
Wikipedia, World of Warcraft Downed By Weekend DDoS Attacks
Wikipedia and World of Warcraft Classic users reported global outages over the weekend in targeted - and connected - DDoS attacks.
π΄ Texas Refuses to Pay $2.5M in Massive Ransomware Attack π΄
π Read
via "Dark Reading: ".
The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand.π Read
via "Dark Reading: ".
Dark Reading
Texas Refuses to Pay $2.5M in Massive Ransomware Attack
The ransomware campaign affected 22 local governments, none of which have paid the attackers' $2.5 million ransom demand.
β Telnet Backdoor Opens More Than 1M IoT Radios to Hijack β
π Read
via "Threatpost".
Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.π Read
via "Threatpost".
Threat Post
Telnet Backdoor Opens More Than 1M IoT Radios to Hijack
Attackers can drop malware, add the device to a botnet or send their own audio streams to compromised devices.
π΄ Public Exposure Does Little to Slow China-Based Thrip APT π΄
π Read
via "Dark Reading: ".
Over the past year, the cyber-espionage group has attacked at least 12 other companies in the military, telecom, and satellite sectors, Symantec says.π Read
via "Dark Reading: ".
Darkreading
Public Exposure Does Little to Slow China-Based Thrip APT
Over the past year, the cyber-espionage group has attacked at least 12 other companies in the military, telecom, and satellite sectors, Symantec says.
β Stealth Falcon Targets Middle East with Windows BITS Feature β
π Read
via "Threatpost".
Cyberespionage attackers have ditched their PowerShell backdoor in favor of the Windows BITS βnotificationβ feature.π Read
via "Threatpost".
Threat Post
Stealth Falcon Targets Middle East with Windows BITS Feature
Cyberespionage attackers have ditched their PowerShell backdoor in favor of the Windows BITS βnotificationβ feature.
β PsiXBot Adds PornModule, Google DNS Service to Its Arsenal β
π Read
via "Threatpost".
Porn-recording feature will likely be used for extortion.π Read
via "Threatpost".
Threat Post
PsiXBot Adds PornModule, Google DNS Service to Its Arsenal
Porn-recording feature will likely be used for extortion.
π More than 99% of attacks in the past year relied on human error to gain access π
π Read
via "Security on TechRepublic".
Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint.π Read
via "Security on TechRepublic".
TechRepublic
More than 99% of attacks in the past year relied on human error to gain access
Experiencing a data breach purely from being internet-connected is quite rare. Hackers rely on users to open or install a malicious payload, according to Proofpoint.
π How to set up an SFTP server on Linux π
π Read
via "Security on TechRepublic".
These steps walk you through the process of setting up an SFTP server on Linux for the secure transfer of files for specialized file transfer-only users.π Read
via "Security on TechRepublic".
TechRepublic
How to Set Up an SFTP Server on Linux
These steps walk you through the process of setting up an SFTP server on Linux for the secure transfer of files for specialized file transfer-only users.
π Top 5 password alternatives π
π Read
via "Security on TechRepublic".
Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords.π Read
via "Security on TechRepublic".
π Top 5 password alternatives π
π Read
via "Security on TechRepublic".
Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords.π Read
via "Security on TechRepublic".
TechRepublic
Top 5 password alternatives
Passwords remain the most common way to authenticate your online identity, but companies like Microsoft and Google are using alternate login methods. Tom Merritt offers five alternatives to passwords.
π΄ More Than 99% of Cyberattacks Need Victims' Help π΄
π Read
via "Dark Reading: ".
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.π Read
via "Dark Reading: ".
Darkreading
More Than 99% of Cyberattacks Need Victims' Help
Research highlights how most criminals exploit human curiosity and trust to click, download, install, open, and send money or information.
ATENTIONβΌ New - CVE-2019-10253
π Read
via "National Vulnerability Database".
A Cross-Site Request Forgery (CSRF) vulnerability exists in TeamMate+ 21.0.0.0 that allows a remote attacker to modify application data (upload malicious/forged files on a TeamMate server, or replace existing uploaded files with malicious/forged files). The specific flaw exists within the handling of Upload/DomainObjectDocumentUpload.ashx requests because of failure to validate a CSRF token before handling a POST request.π Read
via "National Vulnerability Database".
β Critical TLS flaw opens Exim servers to remote compromise β
π Read
via "Naked Security".
A βcriticalβ security vulnerability has been discovered in the Exim mail server that requires admins' urgent attention.π Read
via "Naked Security".
Naked Security
Critical TLS flaw opens Exim servers to remote compromise
A βcriticalβ security vulnerability has been discovered in the Exim mail server that requires adminsβ urgent attention.
β Chrome bumps ineffective EV certificates off the omnibar β
π Read
via "Naked Security".
Ever notice a missing company name next to the URL address bar? Ever change behavior because of it? Likely not, so bye-bye, useless badge.π Read
via "Naked Security".
Naked Security
Chrome bumps ineffective EV certificates off the omnibar
Ever notice a missing company name next to the URL address bar? Ever change behavior because of it? Likely not, so bye-bye, useless badge.