Industrial VPN Flaws Could Let Attackers Target Critical Infrastructures

2020-07-29T16:34:41+02:00

Cybersecurity researchers have discovered critical vulnerabilities in industrial VPN implementations primarily used to provide remote access to operational technology (OT) networks that could allow hackers to overwrite data, execute malicious code, and compromise industrial control systems (ICS). A new report published by industrial cybersecurity company Claroty demonstrates multiple severe vulnerabilities in enterprise-grade VPN installations, including Secomea GateManager [...]

Industrial VPN Flaws Could Let Attackers Target Critical Infrastructures2020-07-29T16:34:41+02:00

Undetectable Linux Malware Targeting Docker Servers With Exposed APIs

2020-07-29T09:48:11+02:00

Cybersecurity researchers today uncovered a completely undetectable Linux malware that exploits undocumented techniques to stay under the radar and targets publicly accessible Docker servers hosted with popular cloud platforms, including AWS, Azure, and Alibaba Cloud. Docker is a popular platform-as-a-service (PaaS) solution for Linux and Windows designed to make it easier for developers to create, test, and [...]

Undetectable Linux Malware Targeting Docker Servers With Exposed APIs2020-07-29T09:48:11+02:00

Garmin Suffers Reported Ransomware Attack

2020-07-28T08:30:57+02:00

Garmin’s consumer and commercial aviation services, websites and customer service have all been rendered unavailable. Garmin, maker of fitness trackers, smartwatches and GPS-related products, has reportedly suffered a widespread ransomware attack — though the facts around the cause remain unconfirmed for now. The manufacturer tweeted on Thursday that its Garmin Connect service is down; Garmin is a [...]

Garmin Suffers Reported Ransomware Attack2020-07-28T08:30:57+02:00

Hackers Exploited CVE-2020-3452 Flaw in Cisco ASA & FTD Within Hours After the Disclosure

2020-07-27T14:41:22+02:00

Cisco fixed a high-severity path traversal vulnerability CVE-2020-3452 with Cisco Adaptive Security Appliance (ASA) Software and Cisco Firepower Threat Defense (FTD) Software. The vulnerability allows a remote attacker to launch a directory traversal attack that allows attackers to read sensitive files on a targeted system. The vulnerability is due to proper lack of input validation [...]

Hackers Exploited CVE-2020-3452 Flaw in Cisco ASA & FTD Within Hours After the Disclosure2020-07-27T14:41:22+02:00

GitHub security team finds remote code execution bug in popular Node.js changelog library

2020-07-20T16:23:55+02:00

Vulnerability impacts standard-version utility, which is used by more than 20,000 projects A recently discovered bug allows hackers to execute shell commands in several node.js repositories, including the popular standard-version changelog utility, which is used by more than 20,000 projects, the GitHub Security Lab discovered last week. In cases where standard-version’s releaseCommitMessageFormat parameter is provided with a user-controlled input, [...]

GitHub security team finds remote code execution bug in popular Node.js changelog library2020-07-20T16:23:55+02:00

17-Year-Old Critical ‘Wormable’ RCE Vulnerability Impacts Windows DNS Servers

2020-07-15T08:42:20+02:00

Cybersecurity researchers today disclosed a new highly critical "wormable" vulnerability—carrying a severity score of 10 out of 10 on the CVSS scale—affecting Windows Server versions 2003 to 2019. The 17-year-old remote code execution flaw (CVE-2020-1350), dubbed 'SigRed' by Check Point, could allow an unauthenticated, remote attacker to gain domain administrator privileges over targeted servers and [...]

17-Year-Old Critical ‘Wormable’ RCE Vulnerability Impacts Windows DNS Servers2020-07-15T08:42:20+02:00

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers

2020-07-14T10:35:48+02:00

SAP has patched a critical vulnerability impacting the LM Configuration Wizard component in NetWeaver Application Server (AS) Java platform, allowing an unauthenticated attacker to take control of SAP applications. The bug, dubbed RECON and tracked as CVE-2020-6287, is rated with a maximum CVSS score of 10 out of 10, potentially affecting over 40,000 SAP customers, according to cybersecurity [...]

New Highly-Critical SAP Bug Could Let Attackers Take Over Corporate Servers2020-07-14T10:35:48+02:00

Alina – A Point of Sale (POS) Malware Abusing Global DNS Traffic To Exfiltrated The Credit Card Data

2020-07-08T09:37:34+02:00

Recently, a new malware that is POS (Point-of-sale) “Alina” has been discovered, and experts stated that it has been using the DNS protocol to exfiltrated the credit card data.  This brand-new POS malware named Alina has been around since 2012, but now it attacks again with a new method for stealing credit and debit card data via [...]

Alina – A Point of Sale (POS) Malware Abusing Global DNS Traffic To Exfiltrated The Credit Card Data2020-07-08T09:37:34+02:00

Citrix Bugs Allow Unauthenticated Code Injection, Data Theft

2020-07-07T17:21:58+02:00

Admins should patch their Citrix ADC and Gateway installs immediately. Multiple vulnerabilities in the Citrix Application Delivery Controller (ADC) and Gateway would allow code injection, information disclosure and denial of service, the networking vendor announced Tuesday. Four of the bugs are exploitable by an unauthenticated, remote attacker. The Citrix products  (formerly known as NetScaler ADC [...]

Citrix Bugs Allow Unauthenticated Code Injection, Data Theft2020-07-07T17:21:58+02:00
Nach oben