Aggregator
Gateways to havoc: Overprivileged dormant service accounts
Service accounts are non-human identities used to automate machine-to-machine interactions. They support critical functions – such as running scripts, services, and applications like websites, APIs, and databases – and facilitate integrations, operating as a proxy to humans and supporting business processes. In an ideal world, service accounts have one singular “job”, are granted least privileged access to resources, and are monitored and managed with identity security hygiene best practices in mind. In this utopia, threat … More →
The post Gateways to havoc: Overprivileged dormant service accounts appeared first on Help Net Security.
CVE-2007-2777 | AlstraSoft Template Seller up to 3.25 File Upload admin/addsptemplate.php zip Remote Code Execution (EDB-3959 / XFDB-34398)
中秋福利 | bugbounty笔记 知识星球优惠券放送
CVE-2016-9362 | WAGO 750-881/750-8202/0758-0874-0000-0111 Setting improper authentication (ID 11748 / BID-95074)
CVE-2016-9400 | Teeworlds up to 0.6.3 Snap engine/client/client.cpp ProcessServerPacket memory corruption (Nessus ID 95402 / ID 276224)
CVE-2020-7928 | MongoDB up to 3.6.19/4.0.19/4.2.8/4.4.0/4.5.0 Query buffer overflow
CVE-2020-7927 | MongoDB Ops Manager up to 4.2.17/4.3.9/4.4.2 API Key information disclosure
CVE-2021-20335 | MongoDB Ops Manager 4.4.x SSL cleartext transmission
CVE-2021-20407 | IBM Security Verify Information Queue 1.0.6/1.0.7 Source Code cleartext storage (XFDB-198185)
CVE-2018-25004 | MongoDB up to 3.6.10/4.0.5 Generic Explain Command denial of service
CVE-2021-20332 | MongoDB Rust Driver information disclosure
CVE-2021-3958 | iPack SCADA Automation Software sql injection
CVE-2019-5640 | Rapid7 Nexpose up to 6.6.96 Element Browser Feature information disclosure
CVE-2021-32037 | MongoDB 5.0.2 Aggregation Request assertion
CVE-2021-32039 | VS Code Extension up to 0.7.0 on MongoDB Binary File insufficiently protected credentials
The growing danger of visual hacking and how to protect against it
In this Help Net Security interview, Robert Ramsey, CEO at Rain Technology, discusses the growing threat of visual hacking, how it bypasses traditional cybersecurity measures, and the importance of physical barriers like switchable privacy screens. Could you explain visual hacking and why it poses a significant threat to individuals and organizations? Visual hacking describes any attempt by an individual to see or capture information they have not been authorized to view. Also referred to as … More →
The post The growing danger of visual hacking and how to protect against it appeared first on Help Net Security.