co ESET Discovers 21 New Linux Malware Variants By packetstormsecurity.com Published On :: Thu, 06 Dec 2018 19:56:34 GMT Full Article headline malware linux
co Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
co Linux Command-Line Editors Vulnerable To High Severity Bug By packetstormsecurity.com Published On :: Wed, 12 Jun 2019 15:27:56 GMT Full Article headline linux flaw
co First-Ever Malware Strain Spotted Abusing New DoH Protocol By packetstormsecurity.com Published On :: Wed, 03 Jul 2019 15:46:06 GMT Full Article headline malware linux dns denial of service
co Canonical GitHub Account Hacked, Ubuntu Source Code Safe By packetstormsecurity.com Published On :: Sun, 07 Jul 2019 14:21:40 GMT Full Article headline hacker linux
co Critical Linux Wi-Fi Bug Allows System Compromise By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:36:59 GMT Full Article headline linux wireless flaw
co Windows, Ubuntu, macOS, VirtualBox Fall At Pwn2Own Hacking Contest By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:03 GMT Full Article headline microsoft linux flaw apple conference
co Wireless Decoder 1.0 By packetstormsecurity.com Published On :: Fri, 19 Apr 2013 16:28:42 GMT Wireless Decoder is an application that demonstrates how to recover wireless passwords on Vista/Win7/Win8. Comes with source and the binary. Full Article
co Teltonika RUT9XX Unauthenticated OS Command Injection By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:16:15 GMT Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Full Article
co FLIR Systems FLIR Brickstream 3D+ Unauthenticated Config Download File Disclosure By packetstormsecurity.com Published On :: Mon, 15 Oct 2018 16:58:29 GMT The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated config download and file disclosure vulnerability when calling the ExportConfig REST API (getConfigExportFile.cgi). This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and/or full system access. Full Article
co Webmin 1.900 Remote Command Execution By packetstormsecurity.com Published On :: Fri, 18 Jan 2019 14:44:44 GMT This Metasploit module exploits an arbitrary command execution vulnerability in Webmin versions 1.900 and below. Any user authorized to the "Java file manager" and "Upload and Download" fields, to execute arbitrary commands with root privileges. In addition, "Running Processes" field must be authorized to discover the directory to be uploaded. A vulnerable file can be printed on the original files of the Webmin application. The vulnerable file we are uploading should be integrated with the application. Therefore, a ".cgi" file with the vulnerability belong to webmin application should be used. The module has been tested successfully with Webmin version 1.900 over Debian 4.9.18. Full Article
co devolo dLAN 550 duo+ 3.1.0-1 Starter Kit Remote Code Execution By packetstormsecurity.com Published On :: Tue, 05 Feb 2019 02:33:18 GMT devolo dLAN 550 duo+ version 3.1.0-1 suffers from a remote code execution vulnerability. The devolo firmware has what seems to be a 'hidden' services which can be enabled by authenticated attacker via the the htmlmgr CGI script. This allows the attacker to start services that are deprecated or discontinued and achieve remote arbitrary code execution with root privileges. Full Article
co Imperva SecureSphere 13.x PWS Command Injection By packetstormsecurity.com Published On :: Wed, 06 Mar 2019 18:19:49 GMT This Metasploit module exploits a command injection vulnerability in Imperva SecureSphere version 13.x. The vulnerability exists in the PWS service, where Python CGIs did not properly sanitize user supplied command parameters and directly passes them to corresponding CLI utility, leading to command injection. Agent registration credential is required to exploit SecureSphere in gateway mode. This module was successfully tested on Imperva SecureSphere 13.0/13.1/13.2 in pre-ftl mode and unsealed gateway mode. Full Article
co Sierra Wireless AirLink ES450 ACEManager iplogging.cgi Command Injection By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 19:32:22 GMT An exploitable command injection vulnerability exists in the ACEManager iplogging.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can inject arbitrary commands, resulting in arbitrary command execution. An attacker can send an authenticated HTTP request to trigger this vulnerability. Full Article
co Sierra Wireless AirLink ES450 ACEManager upload.cgi Remote Code Execution By packetstormsecurity.com Published On :: Fri, 26 Apr 2019 21:01:11 GMT An exploitable remote code execution vulnerability exists in the upload.cgi functionality of Sierra Wireless AirLink ES450 FW 4.9.3. A specially crafted HTTP request can upload a file, resulting in executable code being uploaded, and routable, to the webserver. An attacker can make an authenticated HTTP request to trigger this vulnerability. Full Article
co RICOH SP 4510DN Printer HTML Injection By packetstormsecurity.com Published On :: Thu, 09 May 2019 14:55:55 GMT An HTML Injection vulnerability has been discovered on the RICOH SP 4510DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn parameter. Full Article
co RICOH SP 4520DN Printer HTML Injection By packetstormsecurity.com Published On :: Thu, 09 May 2019 18:22:22 GMT An HTML Injection vulnerability has been discovered on the RICOH SP 4520DN via the /web/entry/en/address/adrsSetUserWizard.cgi entryNameIn or entryDisplayNameIn parameter. Full Article
co Barco WePresent file_transfer.cgi Command Injection By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 16:16:55 GMT This Metasploit module exploits an unauthenticated remote command injection vulnerability found in Barco WePresent and related OEM'ed products. The vulnerability is triggered via an HTTP POST request to the file_transfer.cgi endpoint. Full Article
co D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
co UN Global Compact CEO reaffirms faith in FDI By www.fdiintelligence.com Published On :: Mon, 13 Apr 2020 12:03:41 +0000 The CEO of the UN’s Global Compact initiative, Lise Kingo, talks about the sustainability shift in the C-suite, FDI’s role in achieving the SDGs and how CEOs can address common risks. Full Article
co Iran Seizes 1,000 Bitcoin Mining Machines After Power Spike By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:07 GMT Full Article headline iran cryptography
co APT33 Is Targeting Industrial Control Systems By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:11 GMT Full Article headline hacker government cyberwar iran scada
co Iran Has Already Hacked The U.S. At Least Four Times And Could Do It Again By packetstormsecurity.com Published On :: Tue, 07 Jan 2020 16:45:47 GMT Full Article headline hacker government usa cyberwar iran military
co Suspected Iranian Hackers Target European Energy Companies By packetstormsecurity.com Published On :: Thu, 23 Jan 2020 16:22:18 GMT Full Article headline hacker government cyberwar iran scada
co Symantec Donation Safeguards Computer Labs for Students By feeds.techsoup.org Published On :: Fri, 29 Sep 2017 15:30:00 GMT The Inland Empire, which encompasses 27,000 square miles in Southern California, has one of the highest rates of poverty in the U.S.'s twenty-five largest metropolitan areas. One in five people there live at the poverty level. Smooth Transition, Inc., is a nonprofit educational and vocational training organization that has been working with local at-risk populations since 2009. It aims to provide a gateway towards empowerment, educational, and employment opportunities to lead a fulfilling, prosperous, and purposeful life. Breaking Harmful Cycles Smooth Transition began working to reach at-risk teens early — before they dropped out of high school or left the foster care system. It later expanded its program to include all at-risk populations, including displaced adults, as a means to better help the community. Smooth Transition's life skills development and educational training increase levels of employability. Its mentorship helps prevent its clients from re-entering the foster and judicial system or repeating poverty and homelessness cycles. The nonprofit provides flexible and relevant programs that are accredited through the Western Association of Schools and Colleges. Its programs are directly tied to career pathways and provide students with vocational certifications at little or no cost to them. Graduates have a high completion rate as compared with other programs that serve at-risk populations. But students also come away with significant increases in their perceived self-value and a decrease in perceived barriers to success. Keeping the Computer Labs Secure In 2016, Smooth Transition served roughly 2,800 people with just four full-time staff members. Many of its programs are computer-based and require that its computer labs serve multiple uses and multiple users. One of the organization's board members manages its IT needs on a volunteer basis. He recommended Symantec's Norton Small Business, and the organization has been using it on its systems since it was founded. Symantec's donation of antivirus protection — through TechSoup — has enabled the nonprofit to safely use its computer labs and has increased the number of programs and services it can offer to its students. According to Dr. Robin Goins, president and executive director of Smooth Transition, "The donations we receive are the foundation of our success, and we cannot express enough the generational and community impact the Symantec donations provide us. Smooth Transition is an appreciative recipient of the donations we received from Symantec and we look forward to providing even more impactful community programs as a result." Goins goes on to describe how Smooth Transition's testing centers are networked, with students taking roughly 250,000 different kinds of exams. She worried that without security in the testing centers, the tests would be disrupted, causing a very serious problem. "If we have things disrupting our classes it costs us money. It also costs students the ability to complete their work. Having viruses attack us would be catastrophic for us." Goins points out that Norton Small Business also helps protect confidential information. "As a school, we're required to protect the identity of our students and a lot of their demographic information," she said. Smooth Transition will continue to work throughout the Inland Empire to provide flexible training and resources for those who don't fit the traditional education model. Though it faces many challenges in providing students with real, relevant work tools and skills, its staff is relieved, knowing that its systems and data are protected. spanhidden Full Article symantec
co How to Recognize a Suspicious Email By feeds.techsoup.org Published On :: Fri, 13 Oct 2017 23:23:30 GMT As champions of National Cyber Security Awareness Month (NCSAM), we're kicking off our first week with a focus on email. Read on for facts and tips on email security from the National Cyber Security Alliance. Across the world, 269 billion emails are sent every day. It's estimated that the average business user will receive 96 emails per day by 2019 (source: Radicati). Given our reliance on the medium, it's no surprise that email is one of cybercriminals' favorite methods of attack. According to the National Cyber Security Alliance, 85 percent of U.S. organizations have experienced a phishing attack and 30 percent of people have opened a phishing email. There are simple steps you can take to ensure that you don't become a victim of a cyberattack. Somewhat like a poker tell, suspicious emails contain hints that the sender isn't who they claim to be. Watch this video to learn how to spot email scams. The Facts About Email Scams Suspicious emails engage in "spoofing," a type of scam in which attackers impersonate a trustworthy entity to make it more likely that the recipient will open and act on the email. Spoofed emails typically employ one of two tactics: Phishing, the attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money) for malicious reasons. Spreading malware by getting the user to open malicious email attachments or click on malicious links. Practical Tips on Spotting Suspicious Emails Look carefully at the email and ask yourself the following questions: Do you know or recognize the "from" address or contact's name? Does the message contain incorrect grammar or misspelled words? Does the message ask you to take action on something you didn't request, such as "click on this link to pick the new phone you requested"? If the answer to the first is no, or the answer to the second or third above is yes: Don't click on links. Instead, hover your cursor over links to determine if the address is unknown, suspicious, or misleading: for example, www.microsoft.com.maliciousdomain.it. Don't open any attachments the email contains. If you suspect a work email is a phishing attack, immediately report it to your IT administrator so they can alert your fellow coworkers of the attempted attack. If it's a personal email, most email service providers provide a mechanism to report that. Check out this example from Gmail. Additional Cybersecurity Resources Want to learn more about cybersecurity and how you can keep your data safe? Read our latest blog post about the Equifax breach. Need a little inspiration? Find out how TechSoup and Symantec are making a difference in the lives of at-risk teens. Get more security tips from the National Cyber Security Alliance. National Cyber Security Alliance Month — observed every October — was created as a collaborative effort between government and industry to ensure all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security communications
co Keep Your Data Safe: The Joy of Locking Your Computer By feeds.techsoup.org Published On :: Fri, 27 Oct 2017 17:36:00 GMT Here's a simple way to keep your data safe from potential bad actors in one easy step. Are you ready? Here it is: Log out and lock your computer whenever you're not in front of it. That's right, it's so simple it can almost be seen as an analog approach to cybersecurity. But make no mistake, all those in-depth disk encryption efforts can be rendered pointless. If you step away from your computer while it's on and unlocked, anyone passing by can access it. Working Remotely Promotes Data Vulnerability What's perhaps most insidious about someone gaining physical access to your computer is the fact that the attacker doesn't need any advanced technical know-how to steal sensitive information. A momentary lapse in vigilance at work or a coffee shop can result in a data breach of epic proportions. Let's say you're working remotely at your favorite café down the street from your apartment and you get up to put in an order for a late breakfast, forgetting to lock your laptop. During that brief moment, a low-key cybervillian could easily stick a USB drive into your computer and copy any sensitive files about you — or your organization — and leave undetected. Furthermore, if you were logged in to Gmail, your medical records, or your bank account, that malefactor could wreak havoc on your personal and professional life in a matter of minutes. Tips for Protecting Yourself The good news about all of this is that warding off these types of would-be data plunderers is really, really easy — it's simply a matter of using your operating system's screen locking functionality. If you don't want to do this, then at the very least you should log out of any sensitive online accounts whenever you step away from your machine. For each of the following options, be sure you are aware of the password connected to your user login before locking yourself (or anyone else) out. Screen Locking in Microsoft Windows Press Ctrl+Alt+Delete and select Lock this computer Press Windows+L Either of these will lock your computer and require a password to log back in. You can choose Control Panel > Personalization > Screen Saver Settings and set up a screen saver that provides a login screen to get back in once it's been initiated. Screen Locking in macOS On an external keyboard or older laptops, press Ctrl+Shift+Eject On a MacBook Air or Pro Retina, press Ctrl+Shift+Power You can also go to System Preferences > Security & Privacy > General and select Require password immediately after sleep or screen saver begins (provided you have already set up a screen saver by clicking System Preferences > Desktop & Screen Saver). Additional Cybersecurity Resources Find out how to recognize suspicious emails and protect yourself against malware through better password security Check out our recent post on the future of security threats Get more security tips from the National Cyber Security Alliance. National Cyber Security Awareness Month — observed every October — was created as a collaborative effort between government and industry to ensure that all Americans have the resources they need to stay safer and more secure online. Find out how you can get involved. Image: National Cyber Security Alliance spanhidden Full Article security symantec2017 privacy
co Egypt planning minister strives for sustainable economic growth By www.fdiintelligence.com Published On :: Mon, 20 Jan 2020 09:50:08 +0000 Egypt is well on the way to establishing a diversified economy, claims Hala El Saeed, minister of planning and economic development Full Article
co Tanzanian tourism boom undermined by investor concerns By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:27:06 +0000 Tanzania's economy is booming and its tourism sector is thriving. However, concerns about the president's strong-arm tactics and delays in the completion of key infrastructure projects are threatening this growth. Full Article
co How the Suez Canal Economic Zone is aiding Egypt's economic resurgence By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:41 +0000 Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. Full Article
co Hackers Are Taking Over Twitter Accounts To Sell Face Masks By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:05:31 GMT Full Article headline fraud twitter
co A Twitch Streamer Is Exposing Coronavirus Scams Live By packetstormsecurity.com Published On :: Sat, 28 Mar 2020 15:12:46 GMT Full Article headline virus fraud
co UK Government Cracks Down On Fake Coronavirus News By packetstormsecurity.com Published On :: Mon, 30 Mar 2020 15:32:46 GMT Full Article headline government virus britain fraud
co Microsoft Warns Hospitals About VPN Attacks During Coronavirus By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 13:49:43 GMT Full Article headline hacker microsoft fraud cryptography
co Coronavirus: Facebook Alerts Users Exposed To Misinformation By packetstormsecurity.com Published On :: Thu, 16 Apr 2020 15:30:39 GMT Full Article headline virus fraud facebook social
co Google Blocked 126 Million COVID-19 Phishing Scams In One Week By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:41 GMT Full Article headline email virus cybercrime fraud google phish
co PoetRAT Trojan Targets Energy Sector Using Coronavirus Lures By packetstormsecurity.com Published On :: Fri, 17 Apr 2020 15:22:51 GMT Full Article headline hacker email virus fraud phish scada
co Nintendo Accounts Are Getting Hacked To Buy Fortnite Currency By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 13:43:05 GMT Full Article headline hacker cybercrime fraud nintendo password
co Scam Coronavirus Sites Selling Fake Cures Taken Down By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:14:04 GMT Full Article headline virus cybercrime fraud science
co Favicons Found Housing Credit Card Skimming Malware By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:15 GMT Full Article headline malware bank cybercrime fraud
co Verisk Maplecroft report predicts civil unrest to continue in 2020 By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:49:05 +0000 Escalation in protests across the globe in 2019 are forecast to persist into the new decade, according to Verisk Maplecroft report. Full Article
co Climate concerns top long-term WEF risks for first time By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:59:12 +0000 Severe threats to the environment accounted for all of the five most likely long-term risks in the WEF’s Global Risks Report 2020. Full Article
co fDi Index: investors carried weak sentiment into January as coronavirus threat emerged By www.fdiintelligence.com Published On :: Thu, 12 Mar 2020 10:56:11 +0000 Announced greenfield projects into China plummeted in early 2020 with the US and Europe taking the lion's share of global foreign investment. Full Article
co Serbia's automotive companies drive inward investment By www.fdiintelligence.com Published On :: Thu, 13 Feb 2020 16:41:16 +0000 Foreign investment into Serbia is growing at a healthy pace thanks to its attractive automotive manufacturing industry and highly regarded free zones. Full Article
co Safari Webkit Proxy Object Type Confusion By packetstormsecurity.com Published On :: Sun, 02 Jun 2019 15:30:59 GMT This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload. Full Article
co Total.js CMS 12 Widget JavaScript Code Injection By packetstormsecurity.com Published On :: Mon, 21 Oct 2019 23:29:46 GMT This Metasploit module exploits a vulnerability in Total.js CMS. The issue is that a user with admin permission can embed a malicious JavaScript payload in a widget, which is evaluated server side, and gain remote code execution. Full Article
co Spyware Maker NSO Group Fails To Show Up In Court By packetstormsecurity.com Published On :: Mon, 09 Mar 2020 15:01:28 GMT Full Article headline hacker government privacy phone israel spyware facebook
co Spying Concerns Raised Over Iran's Official COVID-19 App By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:35 GMT Full Article headline government malware virus spyware iran
co US Congress: Spying Law Is Flawed, Open To Abuse, And Lacking In Accountability - So Let's Reauthorize It By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:20 GMT Full Article headline government privacy usa phone spyware nsa
co Android Surveillanceware Operators Jump On The Coronavirus Fear Bandwagon By packetstormsecurity.com Published On :: Thu, 19 Mar 2020 15:12:34 GMT Full Article headline malware phone fraud google spyware