Also: DSLRoot Turns Homes Into Proxies, Cyberattack Disrupts Swedish Towns This week: TransUnion incident affects 4.5 million, DSLRoot residential proxies, Operation Serengeti 2.0, ZipLine campaign exploits contact forms, a cyberattack disrupts 200 Swedish municipalities, Maryland Transit Administration hit by ransomware, TAG-144 escalated attacks in South America.
US Cyber Defense Agency Deploys Support to Nevada Following Ransomware Incident The Cybersecurity and Infrastructure Security Agency and FBI are aiding Nevada after a cyberattack disabled state services, exposing how local governments - amid surging ransomware, IT shortfalls and federal funding cuts - are increasingly reliant on strained national cyber defense resources.
Buying Spanish Startup Brings Real-Time Data Pipeline Tech to Boost SOC Efficiency CrowdStrike announced plans to acquire Spanish startup Onum Technology for $290 million. The move brings advanced data pipeline tools into its Falcon platform, speeding up threat detection and consolidating SOC workflows for customers leaving legacy SIEMs.
AI Giants Evaluated Each Other's Newer Models for Safety Risks OpenAI and Anthropic evaluated each other's AI models in the summer, testing for concerning behaviors that could indicate misalignment risks. Both companies released their findings simultaneously: no model was severely problematic, but all showed plenty of troubling behavior in testing scenarios.
Operation Serengeti 2.0: With Trend Micro’s support, INTERPOL led a major crackdown across Africa, arresting cybercriminals, dismantling infrastructures, recovering illicit funds, and protecting tens of thousands of victims.
A vulnerability, which was classified as critical, was found in Microsoft Exchange Server 2013 CU23/2016 CU17/2016 CU18/2019 CU6/2019 CU7. This affects an unknown part. Executing manipulation can lead to privilege escalation.
This vulnerability is handled as CVE-2020-17117. The attack can be executed remotely. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft Windows. It has been declared as problematic. The affected element is an unknown function of the component GDI+. Such manipulation leads to information disclosure.
This vulnerability is referenced as CVE-2020-17098. The attack can only be performed from a local environment. No exploit is available.
It is best practice to apply a patch to resolve this issue.
A vulnerability marked as critical has been reported in Microsoft Excel up to 2019. Affected by this vulnerability is an unknown functionality. This manipulation causes Remote Code Execution.
This vulnerability is registered as CVE-2020-17123. Remote exploitation of the attack is possible. No exploit is available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability described as problematic has been identified in Microsoft Outlook up to 2019. Affected by this issue is some unknown functionality. Such manipulation leads to information disclosure.
This vulnerability is documented as CVE-2020-17119. The attack can be executed remotely. There is not any exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability, which was classified as critical, was found in Microsoft Office, Office Web Apps and SharePoint Server 2010 SP2. Impacted is an unknown function. The manipulation results in Remote Code Execution.
This vulnerability is known as CVE-2020-17122. It is possible to launch the attack remotely. No exploit is available.
Applying a patch is advised to resolve this issue.
A vulnerability has been found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019 and classified as critical. The affected element is an unknown function. This manipulation causes improper input validation.
This vulnerability is handled as CVE-2020-17115. The attack can be initiated remotely. There is not any exploit available.
It is suggested to install a patch to address this issue.
A vulnerability was found in Microsoft SharePoint 2010 SP1/2013 SP1/2016/2019 and classified as problematic. The impacted element is an unknown function. Such manipulation leads to information disclosure.
This vulnerability is uniquely identified as CVE-2020-17120. The attack can be launched remotely. No exploit exists.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019. It has been classified as critical. This affects an unknown function. Performing manipulation results in privilege escalation.
This vulnerability was named CVE-2020-17121. The attack may be initiated remotely. There is no available exploit.
To fix this issue, it is recommended to deploy a patch.
A vulnerability was found in Microsoft SharePoint 2010 SP2/2013 SP1/2016/2019. It has been declared as critical. This impacts an unknown function. Executing manipulation can lead to an unknown weakness.
The identification of this vulnerability is CVE-2020-17118. The attack may be launched remotely. There is no exploit available.
It is advisable to implement a patch to correct this issue.
A vulnerability classified as critical has been found in Microsoft Windows. Impacted is an unknown function of the component Cloud Files Mini Filter Driver. The manipulation leads to improper privilege management.
This vulnerability is documented as CVE-2020-17103. The attack needs to be performed locally. There is not any exploit available.
To fix this issue, it is recommended to deploy a patch.
A vulnerability classified as critical was found in Microsoft Windows up to Server 2019. This impacts an unknown function of the component Lock Screen. Such manipulation leads to improper authentication.
This vulnerability is documented as CVE-2020-17099. The attack can be executed directly on the physical device. There is not any exploit available.
A patch should be applied to remediate this issue.
A vulnerability was found in Microsoft C SDK for Azure IoT and classified as critical. Affected by this issue is some unknown functionality. Executing manipulation can lead to protection mechanism failure.
The identification of this vulnerability is CVE-2020-17002. The attack may be launched remotely. There is no exploit available.
It is best practice to apply a patch to resolve this issue.