Category: EN

Johnson Controls ICU

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Johnson Controls Inc. Equipment: ICU Vulnerability: Stack-based Buffer Overflow 2. RISK EVALUATION Successful exploitation of this vulnerability may allow an attacker to execute arbitrary code. 3.…

Over 16,000 Fortinet Devices Infected With the Symlink Backdoor

  Over 16,000 internet-connected Fortinet devices have been identified as having a new symlink backdoor that permits read-only access to sensitive data on previously compromised systems.  The Shadowserver Foundation, a threat monitoring platform, has stated that 14,000 machines were exposed.…

ELENOR-corp Ransomware Targets Healthcare Sector

ELENOR-corp ransomware, a new version of Mimic, is targeting healthcare organizations using advanced capabilities This article has been indexed from www.infosecurity-magazine.com Read the original article: ELENOR-corp Ransomware Targets Healthcare Sector

Gmail’s New Encrypted Messages Feature Opens a Door for Scams

Google is rolling out an end-to-end encrypted email feature for business customers, but it could spawn phishing attacks, particularly in non-Gmail inboxes. This article has been indexed from Security Latest Read the original article: Gmail’s New Encrypted Messages Feature Opens…

Data in Danger: Detecting Cross-Site Scripting in Grafana

Learn how SonarQube detected a Cross-Site Scripting (XSS) vulnerability in Grafana, a popular open-source data observability platform. The post Data in Danger: Detecting Cross-Site Scripting in Grafana appeared first on Security Boulevard. This article has been indexed from Security Boulevard…

Harness Adds Traceable WAAP to Secure Web Apps and APIs

Harness today unfurled a cloud web application and application programming interface (API) protection (WAAP) platform that makes it simpler for security operation (SecOps) teams to defend application environments. The post Harness Adds Traceable WAAP to Secure Web Apps and APIs…

ALBEDO Telecom Net.Time – PTP/NTP Clock

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.5 ATTENTION: Exploitable remotely/low attack complexity Vendor: ALBEDO Telecom Equipment: Net.Time – PTP/NTP clock Vulnerability: Insufficient Session Expiration 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to transmit passwords…

Schneider Electric Modicon Controllers

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 10.0 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M580, Modicon M340, Modicon Premium, and Modicon Quantum Vulnerabilities: Trust Boundary Violation, Uncaught Exception, Exposure of Sensitive Information to an Unauthorized Actor,…

CISA Confirms Continued Support for CVE Program, No Funding Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has reaffirmed its strong commitment to the Common Vulnerabilities and Exposures (CVE) Program, following recent public reports that inaccurately suggested the program was in jeopardy due to funding shortages. CISA clarified that…

New Stego Campaign Leverages MS Office Vulnerability to Deliver AsyncRAT

Cybersecurity researchers have discovered a sophisticated malware campaign that employs steganography techniques to hide malicious code within seemingly innocent image files. This attack chain leverages an older Microsoft Office vulnerability (CVE-2017-0199) to ultimately deliver AsyncRAT, a remote access trojan capable…

ToyMaker Hackers Compromised Multitude Hosts Using SSH & File Transfer Tools

In 2023, cybersecurity experts uncovered an extensive compromise in critical infrastructure enterprises by a sophisticated threat actor group. This initial access broker, dubbed “ToyMaker,” systematically exploited vulnerable internet-facing systems before deploying custom backdoors to extract credentials from victim organizations. Their…