π΄ Why Ransomware Will Soon Target the Cloud π΄
π Read
via "Dark Reading: ".
As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.π Read
via "Dark Reading: ".
Darkreading
Why Ransomware Will Soon Target the Cloud
As businesses' daily operations become more dependent on cloud services, ransomware authors will follow to maximize profits. The good news: Many of the best practices for physical servers also apply to the cloud.
ATENTIONβΌ New - CVE-2012-4519
π Read
via "National Vulnerability Database".
Zenphoto before 1.4.3.4 admin-news-articles.php date parameter XSS.π Read
via "National Vulnerability Database".
β Intel Patches High-Severity Flaw in Security Engine β
π Read
via "Threatpost".
The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.π Read
via "Threatpost".
Threat Post
Intel Patches High-Severity Flaw in Security Engine
The high-severity vulnerability could enable denial of service, privilege escalation and information disclosure.
π U.S. Indicts Four Chinese Military Members for Equifax Hack π
π Read
via "Subscriber Blog RSS Feed ".
In charging four Chinese nationals with 2017's Equifax hack this week, the DOJ also said intellectual property - Equifax's own trade secrets - were stolen as part of the hack.π Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
U.S. Indicts Four Chinese Military Members for Equifax Hack
In charging four Chinese nationals with 2017's Equifax hack this week, the DOJ also said intellectual property - Equifax's own trade secrets - were stolen as part of the hack.
π΄ Microsoft Patches Exploited Internet Explorer Flaw π΄
π Read
via "Dark Reading: ".
This month's Patch Tuesday brings fixes for 99 CVEs, including one IE flaw seen exploited in the wild.π Read
via "Dark Reading: ".
Dark Reading
Vulnerabilities & Threats recent news | Dark Reading
Explore the latest news and expert commentary on Vulnerabilities & Threats, brought to you by the editors of Dark Reading
ATENTIONβΌ New - CVE-2012-2517
π Read
via "National Vulnerability Database".
Cross-site scripting (XSS) vulnerability in PrestaShop before 1.4.9 allows remote attackers to inject arbitrary web script or HTML via the index of the product[] parameter to ajax.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2452
π Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in pragmaMx 1.x before 1.12.2 allow remote attackers to inject arbitrary web script or HTML via the (1) name parameter to modules.php or (2) img_url to includes/wysiwyg/spaw/editor/plugins/imgpopup/img_popup.php.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-2216
π Read
via "National Vulnerability Database".
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2012-6720 and CVE-2012-6721. Reason: this candidate was intended for one issue, but the description and references inadvertently combined multiple issues. Notes: All CVE users should consult CVE-2012-6720 and CVE-2012-6721 to determine which ID is appropriate. All references and descriptions in this candidate have been removed to prevent accidental usage.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2012-1124
π Read
via "National Vulnerability Database".
SQL injection vulnerability in search.php in phxEventManager 2.0 beta 5 allows remote attackers to execute arbitrary SQL commands via the search_terms parameter.π Read
via "National Vulnerability Database".
ATENTIONβΌ New - CVE-2009-4067
π Read
via "National Vulnerability Database".
Buffer overflow in the auerswald_probe function in the Auerswald Linux USB driver for the Linux kernel before 2.6.27 allows physically proximate attackers to execute arbitrary code, cause a denial of service via a crafted USB device, or take full control of the system.π Read
via "National Vulnerability Database".
β Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches β
π Read
via "Threatpost".
There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.π Read
via "Threatpost".
Threat Post
Microsoft Addresses Active Attacks, Air-Gap Danger with 99 Patches
There are 12 critical and five previously disclosed bugs in the February 2020 Patch Tuesday Update.
π΄ Healthcare Ransomware Damage Passes $157M Since 2016 π΄
π Read
via "Dark Reading: ".
Researchers found the total cost far exceeded the amount of ransom paid to attackers.π Read
via "Dark Reading: ".
Dark Reading
Healthcare Ransomware Damage Passes $157M Since 2016
Researchers found the total cost far exceeded the amount of ransom paid to attackers.
ATENTIONβΌ New - CVE-2011-4938
π Read
via "National Vulnerability Database".
Multiple cross-site scripting (XSS) vulnerabilities in Ariadne 2.7.6 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO parameter to (1) index.php and (2) loader.php.π Read
via "National Vulnerability Database".
β Data about inmates and jail staff spilled by leaky prison app β
π Read
via "Naked Security".
A web-mapping project came across detainees' prescriptions and other PII that could be used by identity thieves to victimize prisoners.π Read
via "Naked Security".
Naked Security
Data about inmates and jail staff spilled by leaky prison app
A web-mapping project came across detaineesβ prescriptions and other PII that could be used by identity thieves to victimize prisoners.
π Cloud computing security: These two Microsoft tools can help you battle shadow IT π
π Read
via "Security on TechRepublic".
Finding what cloud services employees are using is only half the battle: integrating Microsoft Cloud App Security and Defender Advanced Threat Protection means you can track, block or audit cloud app usage.π Read
via "Security on TechRepublic".
β US charges four Chinese military members with Equifax hack β
π Read
via "Naked Security".
The indictment suggests the hack was part of a series of major data thefts organized by Chinese military and intelligence agencies.π Read
via "Naked Security".
Naked Security
US charges four Chinese military members with Equifax hack
The indictment suggests the hack was part of a series of major data thefts organized by Chinese military and intelligence agencies.
β FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware β
π Read
via "Threatpost".
Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.π Read
via "Threatpost".
Threat Post
FBI: $3.5B Lost in 2019 to Known Cyberscams, Ransomware
Cybercriminals double down on successful internet scams, with a focus on phishing, BEC and other defrauding schemes that have proven to work.
β Katie Moussouris: The Bug Bounty Conflict of Interest β
π Read
via "Threatpost".
Kate Moussouris sounds off on the challenges behind creating successful bug bounty programs.π Read
via "Threatpost".
Threat Post
Katie Moussouris: The Bug Bounty Conflict of Interest
Katie Moussouris sounds off on the challenges behind creating bug bounty programs that actually work.
π΄ 5 Common Errors That Allow Attackers to Go Undetected π΄
π Read
via "Dark Reading: ".
Make these mistakes and invaders might linger in your systems for years.π Read
via "Dark Reading: ".
Darkreading
5 Common Errors That Allow Attackers to Go Undetected
Make these mistakes and invaders might linger in your systems for years.
π΄ Chaos May Be the Key to Quantum-Proof Encryption π΄
π Read
via "Dark Reading: ".
The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.π Read
via "Dark Reading: ".
Dark Reading
Chaos May Be the Key to Quantum-Proof Encryption
The implications of chaos form the basis of a new approach to encryption that promises quantum-proof perfect secrecy.
ATENTIONβΌ New - CVE-2012-0810
π Read
via "National Vulnerability Database".
The int3 handler in the Linux kernel before 3.3 relies on a per-CPU debug stack, which allows local users to cause a denial of service (stack corruption and panic) via a crafted application that triggers certain lock contention.π Read
via "National Vulnerability Database".