Cyber security aggregate rss news

Cyber security aggregator - feeds history

 Trends, Reports, Analysis

Dharma operators use a combination of licensed third-party freeware software, publicly-available exploits, internal Windows tools, and commonly-used security tools, integrated via bespoke scripts.

 Trends, Reports, Analysis

Attackers are employing backdoors capable of maintaining persistence on infected systems, listing and exfiltrating critical files, scouring drives, killing system processes, and executing arbitrary code.

 Trends, Reports, Analysis

From enhancing its operations and starting massive espionage campaigns to developing new tools and shifting its focus to Afghanistan, the group has undergone tremendous evolution.

 Incident Response, Learnings

Newcastle University apologized to students and staff for the "ongoing" disruption. The university said its teams were working with a number of agencies, including police, to find out what happened.

 Laws, Policy, Regulations

The Space Policy Directive-5 recommends best practices to secure the information systems, networks, and “radio-frequency-dependent wireless communication channels” that power US space systems.

 Trends, Reports, Analysis

SQL injection attacks are inexpensive and easy to execute, and the aftermath can be disastrous for the victims. Undoubtedly, this method remains popular among hackers.

 Trends, Reports, Analysis

Many of the cyberattacks on state, local, tribal, and territorial governments are not complicated and could be avoided through improved cyber hygiene and two-factor authentication, a new report says.

 Malware and Vulnerabilities

Millions of WordPress sites are being probed in automated attacks looking to exploit a recently discovered plugin vulnerability, according to security researchers.

 Feed

This Metasploit module exploits an arbitrary file write in cfprefsd on macOS versions 10.15.4 and below in order to run a payload as root. The CFPreferencesSetAppValue function, which is reachable from most unsandboxed processes, can be exploited with a race condition in order to overwrite an arbitrary file as root.   show more ...

By overwriting /etc/pam.d/login a user can then login as root with the login root command without a password.

 Feed

Red Hat Security Advisory 2020-3642-01 - This release of Red Hat JBoss Enterprise Application Platform 7.2.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.9 Release Notes for   show more ...

information about the most significant bug fixes and enhancements included in this release. Issues addressed include XML injection, denial of service, deserialization, improper authorization, remote SQL injection, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2020-3638-01 - This release of Red Hat JBoss Enterprise Application Platform 7.2.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.9 Release Notes for   show more ...

information about the most significant bug fixes and enhancements included in this release. Issues addressed include XML injection, denial of service, deserialization, improper authorization, remote SQL injection, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2020-3637-01 - This release of Red Hat JBoss Enterprise Application Platform 7.2.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.9 Release Notes for   show more ...

information about the most significant bug fixes and enhancements included in this release. Issues addressed include XML injection, denial of service, deserialization, improper authorization, remote SQL injection, and traversal vulnerabilities.

 Feed

Red Hat Security Advisory 2020-3639-01 - This release of Red Hat JBoss Enterprise Application Platform 7.2.9 serves as a replacement for Red Hat JBoss Enterprise Application Platform 7.2.8, and includes bug fixes and enhancements. See the Red Hat JBoss Enterprise Application Platform 7.2.9 Release Notes for   show more ...

information about the most significant bug fixes and enhancements included in this release. Issues addressed include XML injection, denial of service, deserialization, improper authorization, remote SQL injection, and traversal vulnerabilities.

 Feed

Gentoo Linux Security Advisory 202009-2 - Multiple vulnerabilities have been found in Dovecot, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 2.3.11.3 are affected.

 Feed

Red Hat Security Advisory 2020-3634-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.12.0. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2020-3632-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.12.0. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2020-3633-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.12.0. Issues addressed include a use-after-free vulnerability.

 Feed

Red Hat Security Advisory 2020-3631-01 - Mozilla Thunderbird is a standalone mail and newsgroup client. This update upgrades Thunderbird to version 68.12.0. Issues addressed include a use-after-free vulnerability.

 Feed

Even as Visa issued a warning about a new JavaScript web skimmer known as Baka, cybersecurity researchers have uncovered a new flaw in the company's EMV enabled cards that enable cybercriminals to obtain funds and defraud cardholders as well as merchants illicitly. The research, published by a group of academics from the ETH Zurich, is a PIN bypass attack that allows the adversaries to

 Feed

Cyberattacks on small to medium-sized businesses (SMBs) are continuing at a relentless pace, with the vast majority of data breaches coming from outside the organization. Some believe hackers are aggressively targeting these smaller firms because they believe SMBs lack adequate resources and enterprise-grade security tools, making them easier prey than larger businesses. A new report from

2020-09
Aggregator history
Monday, September 07
TUE
WED
THU
FRI
SAT
SUN
MON
SeptemberOctoberNovember