ATENTIONβΌ New - CVE-2011-5250 (snare)
π Read
via "National Vulnerability Database".
Snare for Linux before 1.7.0 has CSRF in the web interface.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-1120
π Read
via "National Vulnerability Database".
EMC RepliStor Server Service before ESA-09-003 has a DoASOCommand Remote Code Execution Vulnerability. The flaw exists within the DoRcvRpcCall RPC function -exposed via the rep_srv.exe process- where the vulnerability is caused by an error when the rep_srv.exe handles a specially crafted packet sent by an unauthenticated attacker.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-4774
π Read
via "National Vulnerability Database".
The Linux kernel before 2.4.36-rc1 has a race condition. It was possible to bypass systrace policies by flooding the ptraced process with SIGCONT signals, which can can wake up a PTRACED process.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2007-4773
π Read
via "National Vulnerability Database".
Systrace before 1.6.0 has insufficient escape policy enforcement.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2005-4891
π Read
via "National Vulnerability Database".
Simple Machine Forum (SMF) versions 1.0.4 and earlier have an SQL injection vulnerability that allows remote attackers to inject arbitrary SQL statements.π Read
via "National Vulnerability Database".
π Ex-Pharma Employees Arrested Following Data Theft in India π
π Read
via "Subscriber Blog RSS Feed ".
The employees allegedly stole confidential information belonging to the company, including batch production control records for drug manufacturing, according to reports.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Ex-Pharma Employees Arrested Following Data Theft in India
The employees allegedly stole confidential information belonging to the company, including batch production control records for drug manufacturing, according to reports.
π How to better protect your organization's most valuable data π
π Read
via "Security on TechRepublic".
Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire.π Read
via "Security on TechRepublic".
TechRepublic
How to better protect your organization's most valuable data
Many organizations underestimate the value of their data to skilled and organized cybercriminals, said security provider eSentire.
β Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft β
π Read
via "Threatpost".
Threatpost talks to Venafi about the recently-disclosed Microsoft vulnerability and whether the hype around the flaw was warranted.π Read
via "Threatpost".
Threat Post
Podcast: NSA Reports Major Crypto-Spoofing Bug to Microsoft
Threatpost talks to Venafi about the recently-disclosed Microsoft vulnerability and whether the hype around the flaw was warranted.
ATENTIONβΌ New - CVE-2011-5266 (securesphere_web_application_firewall)
π Read
via "National Vulnerability Database".
Imperva SecureSphere Web Application Firewall (WAF) before 12-august-2010 allows SQL injection filter bypass.π Read
via "National Vulnerability Database".
π΄ Google Lets iPhone Users Turn Device into Security Key π΄
π Read
via "Dark Reading: ".
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.π Read
via "Dark Reading: ".
Dark Reading
Google Lets iPhone Users Turn Device into Security Key
The iPhone can now be used in lieu of a physical security key as a means of protecting Google accounts.
β A Practical Guide to Zero-Trust Security β
π Read
via "Threatpost".
There are five different pillars to implement when moving to a modern, zero-trust security model.π Read
via "Threatpost".
Threat Post
A Practical Guide to Zero-Trust Security
There are five different pillars to implement when moving to a modern, zero-trust security model.
β Critical WordPress Bug Leaves 320,000 Sites Open to Attack β
π Read
via "Threatpost".
Authentication bypass bugs in WordPress plugins InfiniteWP Client and WP Time Capsule leave hundreds of thousands of sites open to attack.π Read
via "Threatpost".
Threat Post
Critical WordPress Bug Leaves 320,000 Sites Open to Attack
Authentication bypass bugs in WordPress plugins InfiniteWP Client and WP Time Capsule leave hundreds of thousands of sites open to attack.
π΄ 2017 Data Breach Will Cost Equifax at Least $1.38 Billion π΄
π Read
via "Dark Reading: ".
Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today to file a claim.π Read
via "Dark Reading: ".
Dark Reading
2017 Data Breach Will Cost Equifax at Least $1.38 Billion
Company agrees to set aside a minimum of $380.5 million as breach compensation and spend another $1 billion on transforming its information security over the next five years. The 147 million US consumers affected by the breach have one week from today toβ¦
ATENTIONβΌ New - CVE-2009-5068
π Read
via "National Vulnerability Database".
There is a file disclosure vulnerability in SMF (Simple Machines Forum) affecting versions through v2.0.3. On some configurations a SMF deployment is shared by several "co-admins" that are not trusted beyond the SMF deployment. This vulnerability allows them to read arbitrary files on the filesystem and therefore gain new privileges by reading the settings.php with the database passwords.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-5025
π Read
via "National Vulnerability Database".
A backdoor (aka BMSA-2009-07) was found in PyForum v1.0.3 where an attacker who knows a valid user email could force a password reset on behalf of that user.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-3724
π Read
via "National Vulnerability Database".
python-markdown2 before 1.0.1.14 has multiple cross-site scripting (XSS) issues.π Read
via "National Vulnerability Database".
β College students call for ban on facial recognition on campus β
π Read
via "Naked Security".
Fight for the Future is building on its success in pressuring concert promoters to back off of plans to use the technology at festivals.π Read
via "Naked Security".
Naked Security
College students call for ban on facial recognition on campus
Fight for the Future is building on its success in pressuring concert promoters to back off of plans to use the technology at festivals.
β Google to kill third-party Chrome cookies in two years β
π Read
via "Naked Security".
Google doesn't want to block third-party cookies in Chrome right now. It has promised to make them obsolete later, though. Wait - what?π Read
via "Naked Security".
Naked Security
Google to kill third-party Chrome cookies in two years
Google doesnβt want to block third-party cookies in Chrome right now. It has promised to make them obsolete later, though. Wait β what?
β Apps are sharing more of your data with ad industry than you may think β
π Read
via "Naked Security".
Apps like Grindr, Tinder and Happn are (over-)sharing data about sexuality, religion, and location with a shadowy network of data brokers. And it's not just dating apps that are doing it...π Read
via "Naked Security".
Naked Security
Apps are sharing more of your data with ad industry than you may think
Apps like Grindr, Tinder and Happn are (over-)sharing data about sexuality, religion, and location with a shadowy network of data brokers. And itβs not just dating apps that are doing it̷β¦
β Update now! Popular WordPress plugins have password bypass flaws β
π Read
via "Naked Security".
Researchers have discovered bad authentication bypass vulnerabilities affecting two WordPress plugins which should be patched as soon as possible.π Read
via "Naked Security".
Naked Security
Update now! Popular WordPress plugins have password bypass flaws
Researchers have discovered bad authentication bypass vulnerabilities affecting two WordPress plugins which should be patched as soon as possible.
β βFleecewareβ Apps Downloaded 600M Times from Google Play β
π Read
via "Threatpost".
New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store.π Read
via "Threatpost".
Threat Post
βFleecewareβ Apps Downloaded 600M Times from Google Play
New research shows apps that dupe users into being charged excessively with little reward persist on the Android app store.