Category: EN

Kaleris Navis N4 Terminal Operating System

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Kaleris Equipment: Navis N4 Vulnerabilities: Deserialization of Untrusted Data, Cleartext Transmission of Sensitive Information 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker…

Schneider Electric Modicon Controllers

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 7.1 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon Controllers Vulnerabilities: Improper Input Validation, Improper Neutralization of Input During Web Page Generation (‘Cross-site Scripting’), Uncontrolled Resource Consumption 2. RISK EVALUATION Successful…

Parsons AccuWeather Widget

View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable remotely/low attack complexity Vendor: Parsons Equipment: AccuWeather and Custom RSS widget Vulnerability: Cross-site Scripting 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to insert a malicious…

Kubernetes Admission Controllers: Your First Line of Defense

Kubernetes Admission Controllers are a powerful but often overlooked security mechanism. Acting as gatekeepers, they intercept API server requests before objects are persisted in etcd, allowing you to enforce custom policies or inject configurations automatically. Whether it’s blocking privileged containers…

Facebook, Netflix, Microsoft Hijacked to Insert Fake Phone Number

A sophisticated scam operation targeting major American companies, including Netflix, Microsoft, and Bank of America, where attackers manipulate legitimate websites to display fraudulent phone numbers.  The attack, technically classified as a search parameter injection attack, exploits vulnerabilities in website search…

2,000+ Devices Hacked Using Weaponized Social Security Statement Themes

A sophisticated phishing campaign masquerading as official Social Security Administration (SSA) communications has successfully compromised more than 2,000 devices, according to a recent investigation. The attack, which leverages the trust associated with government correspondence, represents a concerning evolution in social…

Malware Campaign Uses Rogue WordPress Plugin to Skim Credit Cards

A long-running malware campaign targeting WordPress via a rogue plugin has been observed skimming data, stealing credentials and user profiling This article has been indexed from www.infosecurity-magazine.com Read the original article: Malware Campaign Uses Rogue WordPress Plugin to Skim Credit…