ATENTIONβΌ New - CVE-2010-4662
π Read
via "National Vulnerability Database".
PmWiki before 2.2.21 has XSS.π Read
via "National Vulnerability Database".
π΄ IoT Malware Campaign Infects Global Manufacturing Sites π΄
π Read
via "Dark Reading: ".
The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.π Read
via "Dark Reading: ".
Darkreading
IoT Malware Campaign Infects Global Manufacturing Sites
The infection uses Lemon_Duck PowerShell malware variant to exploit vulnerabilities in embedded devices at manufacturing sites.
π΄ Department of Energy Adds Attivo Decoys for Critical Infrastructure Security π΄
π Read
via "Dark Reading: ".
The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.π Read
via "Dark Reading: ".
Dark Reading
Department of Energy Adds Attivo Decoys for Critical Infrastructure Security
The decoys and lures will help redirect attacks away from devices that can't be protected through traditional means.
ATENTIONβΌ New - CVE-2011-1151
π Read
via "National Vulnerability Database".
Joomla! 1.6.0 is vulnerable to SQL Injection via the filter_order and filer_order_Dir parameters.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1150
π Read
via "National Vulnerability Database".
bbPress through 1.0.2 has XSS in /bb-login.php url via the re parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1069
π Read
via "National Vulnerability Database".
PHPShop through 0.8.1 has XSS.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1009
π Read
via "National Vulnerability Database".
Vanilla Forums 2.0.17.1 through 2.0.17.5 has XSS in /vanilla/index.php via the p parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-0525
π Read
via "National Vulnerability Database".
Batavi before 1.0 has CSRF.π Read
via "National Vulnerability Database".
π΄ Majority of Network, App-Layer DDoS Attacks in 2019 Were Small π΄
π Read
via "Dark Reading: ".
Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.π Read
via "Dark Reading: ".
Darkreading
Majority of Network, App-Layer DDoS Attacks in 2019 Were Small
Attacks turned to cheaper, shorter attacks to try and disrupt targets, Imperva analysis shows.
π΄ Vixie: The Unintended Consequences of Internet Privacy Efforts π΄
π Read
via "Dark Reading: ".
Paul Vixie says emerging encryption protocols for endpoints could 'break' security in enterprise - and even home - networks.π Read
via "Dark Reading: ".
Dark Reading
Vixie: The Unintended Consequences of Internet Privacy Efforts
Paul Vixie says emerging encryption protocols for endpoints could break security in enterprise - and even home - networks.
ATENTIONβΌ New - CVE-2011-1597
π Read
via "National Vulnerability Database".
OpenVAS Manager v2.0.3 allows plugin remote code execution.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2011-1517
π Read
via "National Vulnerability Database".
SAP NetWeaver 7.0 allows Remote Code Execution and Denial of Service caused by an error in the DiagTraceHex() function. By sending a specially-crafted packet, an attacker could exploit this vulnerability to cause the application to crash.π Read
via "National Vulnerability Database".
β Android pulls 24 βdangerousβ malware-filled apps from Play Store β
π Read
via "Naked Security".
The malware-infected apps used to harvest data and sign users up to premium services have been downloaded more than 382 million times.π Read
via "Naked Security".
Sophos News
Naked Security β Sophos News
β Dropbox Passes $1M Milestone for Bug-Bounty Payouts β
π Read
via "Threatpost".
The file-sharing service also disclosed details of past notable bugs for the first time.π Read
via "Threatpost".
Threat Post
Dropbox Passes $1M Milestone for Bug-Bounty Payouts
The file-sharing service also disclosed details of past notable bugs for the first time.
β Charming Kitten Uses Fake Interview Requests to Target Public Figures β
π Read
via "Threatpost".
APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.π Read
via "Threatpost".
Threat Post
Charming Kitten Uses Fake Interview Requests to Target Public Figures
APT group poses as a former Wall Street Journal journalist to launch phishing campaigns and steal victim email account details.
β Googleβs Chrome 80 clamps down on cookies and notification spam β
π Read
via "Naked Security".
Version 80 of the Chrome browser is out with some new features designed to save your security and your sanity.π Read
via "Naked Security".
Naked Security
Googleβs Chrome 80 clamps down on cookies and notification spam
Version 80 of the Chrome browser is out with some new features designed to save your security and your sanity.
π΄ RSAC Sets Finalists for Innovation Sandbox π΄
π Read
via "Dark Reading: ".
The 10 finalists will each have three minutes to make their case for being the most innovative, promising young security company of the year.π Read
via "Dark Reading: ".
β Twitter bans deepfakes, but only those βlikely to cause harmβ β
π Read
via "Naked Security".
Twitter isn't interested in how the βsynthetic or manipulatedβ media is created, but if it has the potential to cause harm it'll be removed.π Read
via "Naked Security".
Naked Security
Twitter bans deepfakes, but only those βlikely to cause harmβ
Twitter isnβt interested in how the βsynthetic or manipulatedβ media is created, but if it has the potential to cause harm itβll be removed.
π IoT is a gold mine for hackers using fileless malware for cyberattacks π
π Read
via "Security on TechRepublic".
Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.π Read
via "Security on TechRepublic".
TechRepublic
IoT is a gold mine for hackers using fileless malware for cyberattacks
Data exposure is one of the biggest threats from attacks on IoT devices. A new report recommends a shift to perimeter-less security strategies.
π΄ How Can We Make Election Technology Secure? π΄
π Read
via "Dark Reading: ".
In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.π Read
via "Dark Reading: ".
Darkreading
How Can We Make Election Technology Secure?
In Iowa this week, a smartphone app for reporting presidential caucus results debuted. It did not go well.
ATENTIONβΌ New - CVE-2012-2593
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in the administrative interface in Atmail Webmail Server 6.4 allows remote attackers to inject arbitrary web script or HTML via the Date field of an email.π Read
via "National Vulnerability Database".