search

Date range
Filters

17501 results

Pierluigi Paganini May 03, 2019
Cisco addresses a critical flaw in Nexus 9000 switches

Cisco released security patches to address tens of vulnerabilities in its products, including a critical vulnerability affecting Nexus 9000 switches. Cisco released security patches to address tens of vulnerabilities in its products. Among the flaws fixed by Cisco, there is also a critical vulnerability in Nexus 9000 switches that is tracked as CVE-2019-1804 and that […]

Pierluigi Paganini May 03, 2019
10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

The availability of 10KBLAZE PoC exploits for old SAP configuration issue poses a severe risk of attacks for business applications. The risk of cyber attacks against SAP systems is increased after security researchers released PoC exploits for old SAP configuration flaws. SAP Message Server and SAP Gateway implements an access control list (ACL) mechanism to […]

Pierluigi Paganini May 03, 2019
Ladders Database Exposed 13M User Records

Employment-recruitment site Ladders exposed 13M User Records Employment-recruitment site Ladders exposed left online a misconfigured AWS-hosted database that contained 13 million user records. Sanyam Jain, a security researcher and a member of the GDI Foundation, discovered a database belonging to the employment-recruitment site Ladders left exposed online on a misconfigured AWS-hosted database. The archive contained 13 […]

Pierluigi Paganini May 02, 2019
Russian national ANTON P. BOGDANOV indicted for $1.5M cyber tax fraud scheme

The US DoJ indicted a Russian national for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. The US DoJ indicted the Russian national ANTON P. BOGDANOV for obtaining over $1.5 million in fraudulent tax refunds from the Internal Revenue Service. Bogdanov was charged in federal court in Brooklyn of wire fraud conspiracy, […]

Pierluigi Paganini May 02, 2019
APT34: Glimpse project

The APT34 Glimpse project is maybe the most complete APT34 project known so far, the popular researcher Marco Ramilli analyzed it for us. Indeed we might observe a File-based command and control (a quite unusual solution) structure, a VBS launcher, a PowerShell Payload and a covert channel over DNS engine. This last feature is the most […]

Pierluigi Paganini May 02, 2019
Magecart Group 12 also targets Opencart-based online stores

Magecart made the headlines again, Magecart Group 12 is conducting a large-scale operation that targets OpenCart online stores. According to security experts at RiskIQ, the Magecart Group 12 is behind a large-scale operation against OpenCart online stores. The attackers used stealth tactics to remain under the radar and siphon payment data from compromised e-commerce sites. […]

Pierluigi Paganini May 02, 2019
A ‘Cyber Event’ disrupted power grid operations in three US states

The Department of Energy confirmed that in March a cyber event disrupted power grid operations in California, Wyoming, and Utah. The Department of Energy confirmed that on March 2019, between 9 a.m. and 7 p.m., a cyber event disrupted energy grid operations in California, Wyoming, and Utah. The news was first reported by E&E News, […]

Pierluigi Paganini May 02, 2019
How to Hack Dell computers exploiting a flaw in pre-installed Dell SupportAssist

A flaw in Dell SupportAssist, a pre-installed tool on most Dell computers, could be exploited by hackers to compromise them remotely. The security researcher Bill Demirkapi (17) has discovered a critical remote code execution vulnerability in the Dell SupportAssist utility that is pre-installed on most Dell computers. The vulnerability could be exploited by hackers to […]

Pierluigi Paganini May 02, 2019
Tenable experts found 15 flaws in wireless presentation systems

Experts at Tenable discovered 15 vulnerabilities in eight wireless presentation systems, including flaws that can be exploited to remotely hack devices. Wireless presentation systems are used to display content on a screen or through several devices, including mobile devices and laptops. These systems are widely used in enterprises and educational organizations. Researchers at Tenable discovered […]

Pierluigi Paganini May 02, 2019
Citrix confirmed hackers had access to its network for five months

Citrix confirmed that the hackers who breached its network stole sensitive personal information of both former and current employees for about six months. In March, the American multinational software company Citrix disclosed a security breach, according to the firm an international cyber criminals gang gained access to its internal network. Experts at cybersecurity firm Resecurity […]