ca Facebook Phishing Campaign Hitting iOS Users By packetstormsecurity.com Published On :: Tue, 12 Mar 2019 14:50:22 GMT Full Article headline phone phish facebook social
ca Black Friday Shoppers Targeted By Scams And Fake Domains By packetstormsecurity.com Published On :: Wed, 27 Nov 2019 16:03:13 GMT Full Article headline cybercrime fraud scam phish
ca Phishing Campaign Leads To UPS Store Data Breach By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:26 GMT Full Article headline hacker privacy data loss phish
ca U.S. Finance Sector Hit With Targeted Backdoor Campaign By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:27 GMT Full Article headline hacker malware bank phish
ca Coronavirus-Themed Phishing Attacks And Hacking Campaigns Are On The Rise By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:57 GMT Full Article headline hacker government virus fraud phish
ca Inside An Instagram Celebrity Hacking Campaign By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:32 GMT Full Article headline privacy password phish facebook
ca Spear-Phishing Campaign Compromises Executives At 150+ Companies By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:50 GMT Full Article headline hacker africa password phish
ca Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
ca Windows Scammers Threaten To Blow Up Irish Garda Station By packetstormsecurity.com Published On :: Fri, 22 Jul 2011 21:20:49 GMT Full Article headline microsoft scam ireland terror
ca Possible Card Fraud After Loyalty Scheme Breach By packetstormsecurity.com Published On :: Thu, 14 Nov 2013 16:01:33 GMT Full Article headline hacker cybercrime data loss fraud ireland
ca Ireland Sides With Microsoft In Email Privacy Case By packetstormsecurity.com Published On :: Fri, 26 Dec 2014 15:39:00 GMT Full Article headline government privacy microsoft email usa ireland
ca Major Win For Microsoft In 'Free For All' Data Case By packetstormsecurity.com Published On :: Fri, 15 Jul 2016 04:51:36 GMT Full Article headline government privacy microsoft usa spyware ireland
ca Irish Supreme Court Rejects Facebook Bid To Block ECJ Data Case By packetstormsecurity.com Published On :: Fri, 31 May 2019 15:08:52 GMT Full Article headline government privacy data loss facebook ireland
ca On The Run In Cuba, McAfee Pushes Cryptocurrency By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:24:03 GMT Full Article headline government usa cuba mcafee cryptography
ca Suricata IDPE 5.0.3 By packetstormsecurity.com Published On :: Tue, 28 Apr 2020 14:56:56 GMT Suricata is a network intrusion detection and prevention engine developed by the Open Information Security Foundation and its supporting vendors. The engine is multi-threaded and has native IPv6 support. It's capable of loading existing Snort rules and signatures and supports the Barnyard and Barnyard2 tools. Full Article
ca Capstone 4.0.2 By packetstormsecurity.com Published On :: Fri, 08 May 2020 20:01:48 GMT Capstone is a multi-architecture, multi-platform disassembly framework. It has a simple and lightweight architecture-neutral API, thread-safe by design, provides details on disassembled instruction, and more. Full Article
ca Evernote Critical Flaw Opened Personal Data Of Millions To Attack By packetstormsecurity.com Published On :: Fri, 14 Jun 2019 16:08:21 GMT Full Article headline privacy flaw chrome
ca Chrome 79 Update On Android Kills Local Data By packetstormsecurity.com Published On :: Mon, 16 Dec 2019 15:18:03 GMT Full Article headline phone data loss flaw google chrome
ca Reddit Gets Caught Censoring By packetstormsecurity.com Published On :: Mon, 21 Apr 2014 19:45:05 GMT Full Article headline censorship
ca UK Student's Research A Wassenaar Casualty By packetstormsecurity.com Published On :: Tue, 07 Jul 2015 13:31:30 GMT Full Article headline government censorship
ca Microsoft's GitHub Blocks Catalan Protest App By packetstormsecurity.com Published On :: Wed, 30 Oct 2019 15:36:48 GMT Full Article headline government microsoft spain censorship
ca Let's Encrypt Reaches One Billion Certificates Issued By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:24 GMT Full Article headline privacy cryptography
ca Let's Encrypt To Revoke 3 Million Certificates On March 4 By packetstormsecurity.com Published On :: Wed, 04 Mar 2020 13:42:34 GMT Full Article headline privacy flaw cryptography
ca SolarWinds MSP PME Cache Service Insecure File Permissions / Code Execution By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:17:54 GMT SolarWinds MSP PME Cache Service versions prior to 1.1.15 suffer from insecure file permission and code execution vulnerabilities. Full Article
ca Canada Says Its Spy Screwed Us By packetstormsecurity.com Published On :: Thu, 26 Sep 2019 14:06:36 GMT Full Article headline government phone canada spyware cryptography
ca Russia Opens Case Against Facebook, Twitter Over Data Laws By packetstormsecurity.com Published On :: Tue, 22 Jan 2019 14:26:52 GMT Full Article headline government privacy russia spyware facebook twitter
ca Twitter Accidentally Shares User Location Data By packetstormsecurity.com Published On :: Tue, 14 May 2019 00:48:30 GMT Full Article headline privacy phone data loss twitter
ca US To Demand Five Years Of Your Social Media, Email Account Info In Your Visa Application By packetstormsecurity.com Published On :: Mon, 03 Jun 2019 14:09:54 GMT Full Article headline government privacy usa facebook social twitter terror
ca MS13-005 HWND_BROADCAST Low to Medium Integrity Privilege Escalation By packetstormsecurity.com Published On :: Mon, 29 Jul 2013 22:14:06 GMT The Windows kernel does not properly isolate broadcast messages from low integrity applications from medium or high integrity applications. This allows commands to be broadcasted to an open medium or high integrity command prompts allowing escalation of privileges. We can spawn a medium integrity command prompt, after spawning a low integrity command prompt, by using the Win+Shift+# combination to specify the position of the command prompt on the taskbar. We can then broadcast our command and hope that the user is away and doesn't corrupt it by interacting with the UI. Broadcast issue affects versions Windows Vista, 7, 8, Server 2008, Server 2008 R2, Server 2012, RT. But Spawning a command prompt with the shortcut key does not work in Vista so you will have to check if the user is already running a command prompt and set SPAWN_PROMPT false. The WEB technique will execute a powershell encoded payload from a Web location. The FILE technique will drop an executable to the file system, set it to medium integrity and execute it. The TYPE technique will attempt to execute a powershell encoded payload directly from the command line but it may take some time to complete. Full Article
ca HP Data Protector Encrypted Communication Remote Command Execution By packetstormsecurity.com Published On :: Tue, 07 Jun 2016 07:51:36 GMT This Metasploit module exploits a well known remote code execution exploit after establishing encrypted control communications with a Data Protector agent. This allows exploitation of Data Protector agents that have been configured to only use encrypted control communications. This exploit works by executing the payload with Microsoft PowerShell so will only work against Windows Vista or newer. Tested against Data Protector 9.0 installed on Windows Server 2008 R2. Full Article
ca GOP Canvassing App Credentials Exposed In Code Repository By packetstormsecurity.com Published On :: Tue, 31 Mar 2020 14:09:13 GMT Full Article headline government privacy usa data loss
ca SEC Settles With Two Suspects In EDGAR Hacking Case By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:09:59 GMT Full Article headline hacker government usa data loss
ca American Gets Targeted By Spy Tool Sold To Foreign Governments By packetstormsecurity.com Published On :: Tue, 04 Jun 2013 13:41:22 GMT Full Article headline government privacy malware usa spyware turkey
ca Nmap Port Scanner 7.80 By packetstormsecurity.com Published On :: Sun, 11 Aug 2019 17:43:45 GMT Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings. Full Article
ca nullscan 1.0.0 By packetstormsecurity.com Published On :: Thu, 26 Mar 2020 14:56:25 GMT nullscan is a modular framework designed to chain and automate security tests. It parses target definitions from the command line and runs corresponding modules and their nullscan-tools afterwards. It can also take hosts and start nmap first in order to perform a basic portscan and run the modules afterwards. Also, nullscan can parse a given nmap logfile for open tcp and udp ports and again run the modules afterwards. All results will be logged in specified directories with a clean structure and an HTML report can subsequently be generated. Full Article
ca Solaris 11.4 xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 15:03:23 GMT Solaris version 11.4 xscreensaver local privilege escalation exploit. Full Article
ca Solaris xscreensaver Privilege Escalation By packetstormsecurity.com Published On :: Wed, 23 Oct 2019 20:15:30 GMT This Metasploit module exploits a vulnerability in xscreensaver versions since 5.06 on unpatched Solaris 11 systems which allows users to gain root privileges. xscreensaver allows users to create a user-owned file at any location on the filesystem using the -log command line argument introduced in version 5.06. This module uses xscreensaver to create a log file in /usr/lib/secure/, overwrites the log file with a shared object, and executes the shared object using the LD_PRELOAD environment variable. This module has been tested successfully on xscreensaver version 5.15 on Solaris 11.1 (x86) and xscreensaver version 5.15 on Solaris 11.3 (x86). Full Article
ca SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
ca Common Desktop Environment 1.6 Local Privilege Escalation By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 22:34:40 GMT A buffer overflow in the _SanityCheck() function in the Common Desktop Environment version distributed with Oracle Solaris 10 1/13 (Update 11) and earlier allows local users to gain root privileges via a long calendar name or calendar owner passed to sdtcm_convert in a malicious calendar file. The open source version of CDE (based on the CDE 2.x codebase) is not affected, because it does not ship the vulnerable program. Versions 1.6 and below are affected. Full Article
ca Practical Attacks With DNS Rebinding By packetstormsecurity.com Published On :: Wed, 04 Apr 2018 20:57:19 GMT Full Article headline dns flaw
ca Scammers Abuse Multilingual Domain Names By packetstormsecurity.com Published On :: Wed, 27 Jun 2018 00:08:32 GMT Full Article headline dns cybercrime fraud phish
ca Fortinet FortiSIEM 5.0 / 5.2.1 Improper Certification Validation By packetstormsecurity.com Published On :: Tue, 01 Oct 2019 20:48:19 GMT A FortiSIEM collector connects to a Supervisor/Worker over HTTPS TLS (443/TCP) to register itself as well as relaying event data such as syslog, netflow, SNMP, etc. When the Collector (the client) connects to the Supervisor/Worker (the server), the client does not validate the server-provided certificate against its root-CA store. Since the client does no server certificate validation, this means any certificate presented to the client will be considered valid and the connection will succeed. If an attacker spoofs a Worker/Supervisor using an ARP or DNS poisoning attack (or any other MITM attack), the Collector will blindly connect to the attacker's HTTPS TLS server. It will disclose the authentication password used along with any data being relayed. Versions 5.0 and 5.2.1 have been tested and are affected. Full Article
ca Google Invisible RECAPTCHA 3 Spoof Bypass By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 15:23:32 GMT Google Invisible RECAPTCHA version 3 suffers from a spoofing bypass vulnerability. Full Article
ca OpenSCAP Libraries 1.3.3 By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:58:08 GMT The openscap project is a set of open source libraries that support the SCAP (Security Content Automation Protocol) set of standards from NIST. It supports CPE, CCE, CVE, CVSS, OVAL, and XCCDF. Full Article
ca Car Park Management System 1.0 SQL Injection By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:20:46 GMT Car Park Management System version 1.0 suffers a remote SQL injection vulnerability that allows for authentication bypass. Full Article
ca Hashcat Advanced Password Recovery 4.0.0 Binary Release By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:09 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release.. Full Article
ca Hashcat Advanced Password Recovery 4.0.0 Source Code By packetstormsecurity.com Published On :: Fri, 27 Oct 2017 18:18:15 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Hashcat Advanced Password Recovery 4.0.1 Binary Release By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:17 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article
ca Hashcat Advanced Password Recovery 4.0.1 Source Code By packetstormsecurity.com Published On :: Tue, 07 Nov 2017 16:20:23 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the source code release. Full Article
ca Hashcat Advanced Password Recovery 4.1.0 Binary Release By packetstormsecurity.com Published On :: Wed, 21 Feb 2018 14:04:20 GMT Hashcat is an advanced GPU hash cracking utility that includes the World's fastest md5crypt, phpass, mscash2 and WPA / WPA2 cracker. It also has the first and only GPGPU-based rule engine, focuses on highly iterated modern hashes, single dictionary-based attacks, and more. This is the binary release. Full Article