Cyber security aggregate rss news

Cyber security aggregator - feeds history

image for Episode 209: Fortine ...

 CISO Close Up

The information security industry needs both better tools to fight adversaries, and more people to do the fighting, says Fortinet Deputy CISO Renee Tarun in this interview with The Security Ledger Podcast’s Paul Roberts. The post Episode 209: Fortinet’s Renee Tarun on Scaling InfoSec To Meet Tomorrow’s   show more ...

Challenges appeared first on The...Read the whole entry... » Related StoriesEpisode 207: Sara Tatsis of Blackberry on finding and Keeping Women in CyberEncore Edition: Veracode CEO Sam King on Infosec’s Leaky Talent PipelineEpisode 205 – Google’s Camille Stewart: InfoSec’s Lack of Diversity is a Cyber Risk

 Incident Response, Learnings

A researcher said that two malicious commits that were added to the PHP web development programming language’s official Git server earlier this week may have been prevented if the maintainers had enabled signed commits (encryption) on the server.

 Trends, Reports, Analysis

The U.S. government is working to draw attention to supply chain vulnerabilities, an issue that received particular attention late last year after suspected Russian hackers gained access to federal agencies and private corporations.

 Trends, Reports, Analysis

Data exposure is a significant, unaddressed problem for Europe’s top mobile providers and, by extension, more than 253 million customers who sign up for their services and share sensitive personal data, according to research by Tala Security.

 Breaches and Incidents

Luxury Italian men’s clothing line Boggi Milano has confirmed what Ragnarok was already bragging about on the Dark Web: The brand was hit with a ransomware attack, according to multiple sources.

 Threat Intel & Info Sharing

In an RSA conference webcast, Alejandro Mayorkas, the U.S. Secretary of Homeland Security, stated that fighting ransomware attacks is now the Department of Homeland Security's number one priority, and a plan to be more proactive is already in place.

 Malware and Vulnerabilities

In a blog post on its website, Trustwave researchers outlined details of a privilege escalation issue, in the popular website CMS, Umbraco, which allows low privileged users to elevate themselves to the status of admin.

 Breaches and Incidents

The private data was leaked on GitHub repositories last year whose contributors carry the "Arctic Code Vault" badge. This means these repositories could now be a part of a huge open-source repo collection bound to last 1,000 years.

 Incident Response, Learnings

Fueled by large payments from victims, ransomware gangs have started to demand ridiculous ransom payments from organizations that can not afford to pay them. One such example is the Broward County Public Schools where hackers demanded $40 Million.

 Incident Response, Learnings

A broker of breached data claims via dedicated .onion leak site to have deleted 8TB of stolen MobiKwik customer data that the company denies was stolen. The listing for 8.2TB of stolen data was withdrawn by a cybercrime forum seller.

 Feed

ZBL EPON ONU Broadband Router version 1.0 suffers from a privilege escalation vulnerability. The limited administrative user (admin:admin) can elevate his/her privileges by sending a HTTP GET request to the configuration backup endpoint or the password page and disclose the http super user password. Once authenticated as super, an attacker will be granted access to additional and privileged functionalities.

 Feed

Ubuntu Security Notice 4900-1 - It was discovered that OpenEXR incorrectly handled certain malformed EXR image files. If a user were tricked into opening a crafted EXR image file, a remote attacker could cause a denial of service, or possibly execute arbitrary code.

 Feed

sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database   show more ...

management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more.

2021-04
Aggregator history
Friday, April 02
THU
FRI
SAT
SUN
MON
TUE
WED
AprilMayJune