Aggregator
CVE-2024-6594 | WatchGuard Single Sign-On Client up to 12.7 on Windows Command exceptional condition (wgsa-2024-00016)
CVE-2024-6593 | WatchGuard Authentication Gateway up to 12.10.2 on Windows Management Command authorization (wgsa-2024-00015)
CVE-2024-6592 | WatchGuard Authentication Gateway/Single Sign-On Client authorization (wgsa-2024-00014)
CVE-2017-13713 | T&W WIFI Repeater BE126 cgi-bin/webupg user command injection (File 143978/Wir / EDB-42608)
构建钢铁行业数字化基石:威努特高效安全网络一体化解决方案
How to Intercept Data Exfiltrated by Malware via Telegram and Discord
Often, malware uses platforms like — Telegram and Discord for data exfiltration. Due to its simplicity and the lack of need for building a server architecture, this exfiltration method has gained significant popularity. However, this very simplicity is also its weakness. In this article we’ll show you how to obtain information related to threat actors’ […]
The post How to Intercept Data Exfiltrated by Malware via Telegram and Discord appeared first on ANY.RUN's Cybersecurity Blog.
Двойник или преемник? MimiStick копирует тактику Sticky Werewolf
CVE-2016-5635 | Oracle MySQL Server up to 5.7.13 Audit denial of service (Nessus ID 93004 / ID 20027)
CVE-2005-1924 | SquirrelMail help path traversal (EDB-4173 / Nessus ID 25873)
CVE-2005-1924 | SquirrelMail gpg_recv_key privileges management (EDB-4173 / Nessus ID 25873)
Trend Micro Warns Devices and Accounts are Highest-Risk Assets
CVE-2016-5634 | Oracle MySQL Server up to 5.7.13 RBR denial of service (Nessus ID 93004 / ID 20027)
如何降低新员工入职带来的网络风险
CVE-2011-3597 | Gisle Aas Digest up to 1.16 digest new input validation (Bug 743010 / EDB-36199)
Biden-Harris Administration Launches NSTC Workforce Center of Excellence with Expected $250 Million Investment
Threat Actors Continue to Exploit OT/ICS through Unsophisticated Means
CISA continues to respond to active exploitation of internet-accessible operational technology (OT) and industrial control systems (ICS) devices, including those in the Water and Wastewater Systems (WWS) Sector. Exposed and vulnerable OT/ICS systems may allow cyber threat actors to use default credentials, conduct brute force attacks, or use other unsophisticated methods to access these devices and cause harm.
CISA urges OT/ICS operators in critical infrastructure sectors to apply the recommendations listed in Defending OT Operations Against Ongoing Pro-Russia Hacktivist Activity to defend against this activity. To learn more about secure by design principles and practices, visit CISA's Secure by Design webpage. For more information and guidance on protection against the most common and impactful threats, tactics, techniques, and procedures, visit CISA’s Cross-Sector Cybersecurity Performance Goals.
Citrix Releases Security Updates for XenServer and Citrix Hypervisor
Citrix released security updates to address multiple vulnerabilities in XenServer and Citrix Hypervisor. A cyber threat actor could exploit some of these vulnerabilities to cause a denial of service condition.
CISA encourages users and administrators to review the following and apply necessary updates:
CISA Warns of Hurricane-Related Scams
As Hurricane Helene approaches, CISA urges users to remain on alert for potential malicious cyber activity. Fraudulent emails and social media messages—often containing malicious links or attachments—are common after major natural disasters. Exercise caution in handling emails with hurricane-related subject lines, attachments, or hyperlinks. In addition, be wary of social media pleas, texts, or door-to-door solicitations relating to severe weather events.
CISA encourages users to review the following resources to avoid falling victim to malicious cyber activity:
- Federal Trade Commission’s Staying Alert to Disaster-related Scams and Before Giving to a Charity,
- Consumer Financial Protection Bureau's Frauds and scams, and
- CISA’s Phishing Guidance, Stopping the Attack Cycle at Phase One to help organizations reduce likelihood and impact of successful phishing attacks.