'Nearest Neighbor Attack' Bypasses Cyber Defenses by Breaching WiFi Networks A Russian cyberespionage group hacked a Washington, D.C.-based organization focused on Ukraine by deploying a new attack technique that exploits Wi-Fi connectivity, according to new research. The "nearest neighbor attack: methodology could lead to a significant broadening of targeting and attacks.
Money Aims to Simplify Fundraising for RSA Conference Innovation Sandbox Finalists Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
Speech by UK Minister Pat McFadden Sparks Backlash A warning from a British government official over the Russian cyberwar sparked a backlash from cybersecurity specialists who urged a measured approach. Russian attacks could "turn the lights off for millions of people," said Pat McFadden, minister for intergovernmental
Group Deploys Upgraded Malware Disguised as Microsoft File on Pilgrimage Goers A South Asian threat actor identified as Mysterious Elephant or APT-K-47 by Knownsec 404 researchers is using a Hajj-themed lure to trick victims into malicious payload disguised as a Windows file. The hacker is using upgraded Asyncshell malware disguised as a Microsoft Compiled HTML Help file.
Trend Micro has identified a spear-phishing campaign active in Japan since June 2024. Evidence about the malware used by this campaign suggests this was part of a new operation by Earth Kasha.
A vulnerability classified as critical was found in Webfileexplorer Web File Explorer 3.1. Affected by this vulnerability is an unknown functionality of the file body.asp. The manipulation of the argument id leads to sql injection.
This vulnerability is known as CVE-2009-1323. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in moziloCMS 1.11 and classified as problematic. This issue affects some unknown processing of the file index.php. The manipulation of the argument query leads to cross site scripting.
The identification of this vulnerability is CVE-2009-1367. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in moziloCMS 1.11. It has been classified as critical. Affected is an unknown function of the file index.php. The manipulation of the argument page leads to path traversal.
This vulnerability is traded as CVE-2009-1368. It is possible to launch the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in moziloCMS 1.11. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file gallery.php of the component Error Message Handler. The manipulation of the argument file[] leads to improper input validation.
This vulnerability is known as CVE-2009-1369. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Xilisoft Xilisoft Video Converter 3.1.53. It has been rated as very critical. Affected by this issue is some unknown functionality of the file ape_plugin.plg. The manipulation leads to memory corruption.
This vulnerability is handled as CVE-2009-1370. The attack may be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Gomlab GOM Player 2.1.16. It has been rated as very critical. This issue affects some unknown processing of the file srt2smi.exe. The manipulation leads to memory corruption.
The identification of this vulnerability is CVE-2009-1497. The attack may be initiated remotely. Furthermore, there is an exploit available.
A vulnerability was found in Webfileexplorer Web File Explorer 3.1. It has been declared as very critical. Affected by this vulnerability is an unknown functionality of the file body.asp. The manipulation of the argument file leads to memory corruption.
This vulnerability is known as CVE-2009-1314. The attack can be launched remotely. Furthermore, there is an exploit available.
A vulnerability was found in Webfileexplorer Web File Explorer 3.1. It has been classified as problematic. This affects an unknown part. The manipulation leads to improper access controls.
This vulnerability is uniquely identified as CVE-2009-1495. It is possible to initiate the attack remotely. Furthermore, there is an exploit available.
A vulnerability was found in OPeNDAP Server3 3.2.10/3.7.4. It has been declared as critical. Affected by this vulnerability is the function get_url. The manipulation leads to improper privilege management.
This vulnerability is known as CVE-2007-2355. The attack can be launched remotely. There is no exploit available.
It is recommended to apply a patch to fix this issue.