Skip to content
Monday, January 25, 2021

Ken Gilmour

Curated News Feeds

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Cyber Tools!
Home>Archive by Category VulnerabilitiesCrypto

Category: VulnerabilitiesCrypto

Security guard avoided Manchester Arena bomber for fear of being called racist

October 27, 2020 Cyber Crime Monitoring Bot15

via theguardian.com Kyle Lawler had a ‘bad feeling’ about Salman Abedi but ‘did not have anything to justify that’A security guard had a “bad feeling” when he saw Manchester Arena suicide bomber Salman Abedi but did not approach him for fear of being b…

Continue Reading

Chinese Attackers’ Favorite Flaws Prove Global Threats, Research Shows

October 27, 2020 Strategic Intel Monitoring Bot17

The 25 vulnerabilities most commonly scanned for and targeted by Chinese nation-state attackers were exploited seven times more often than other flaws in the past six months, researchers report in their analysis of a list published by the US National S…

Continue Reading

Ping Identity Appoints Emma Maslen to Lead EMEA and APAC Growth

October 27, 2020 Auto Bot12

via infosecurity-magazine.com Ping Identity Appoints Emma Maslen to Lead EMEA and APAC GrowthIdentity security firm Ping Identity has announced the appointment of Emma Maslen as its vice-president and general manager for EMEA and APAC. In this role, sh…

Continue Reading

The How, Who and Why of Cyber Attacks In 2019/2020: Part 1 – Know Your Enemies – Lexology

October 27, 2020 Economic Threats Monitoring Bot10

On October 20, 2020, the European Union Agency for Cybersecurity (ENISA) issued its annual Threat Landscape 2020 publication summarizing the main cyber threats and providing insights on the evolution of threats encountered between January 2019-April 2020.

Continue Reading

Risks in IoT Supply Chain

October 27, 2020 Cyber Crime Monitoring Bot14

Executive Summary. IoT The COVID-19 pandemic has accelerated the adoption of IoT devices. As businesses slowly reopen during the pandemic, contactless IoT devices such as point of sale (POS) terminals and body temperature cameras have been widely adopt…

Continue Reading

Major survey finds Australians aware of cyber threats but not fully prepared for them – ACROFAN USA

October 27, 2020 Cyber Crime Monitoring Bot9

SYDNEY Oct. 27, 2020 /PRNewswire/ — A survey by ESET Australia has found that while Australian households are generally well aware of the nature of cybersecurity threats, they are less well prepared to protect themselves from evolving threats targetin…

Continue Reading

Multiple vulnerabilities in Oracle TimesTen In-Memory Database

October 27, 2020 Auto Bot13

Exploit availability: No Description. CWE-284 – Improper Access Control The vulnerability allows a remote attacker to gain unauthorized access to sensitive information. The vulnerability exists due to improper access restrictions when “getACL()” comman…

Continue Reading

Multiple vulnerabilities in Oracle Communications Unified Inventory Management

October 27, 2020 Cyber Crime Monitoring Bot8

.

1) Risk: Low. CVSSv3: CVE-ID: CVE-2020-9488. CWE-ID: Exploit availability: No Description. CWE-295 – Improper Certificate Validation The vulnerability allows a remote attacker to perform man-in-the-middle attack. The vulnerability exists due to the …

Continue Reading

Improper Certificate Validation in Oracle Communications Offline Mediation Controller

October 27, 2020 Auto Bot8

.

Security Advisory. This security advisory describes one low risk vulnerability.

1) Risk: Low. CVSSv3: CVE-ID: CVE-2020-9488. CWE-ID: Exploit availability: No Description. CWE-295 – Improper Certificate Validation The vulnerability allows a remote a…

Continue Reading

Multiple vulnerabilities in Integrated Diameter Intelligence Hub (IDIH)

October 27, 2020 Auto Bot8

Exploit availability: No Description. CWE-300 – Channel Accessible by Non-Endpoint (‘Man-in-the-Middle’) The vulnerability allows a remote attacker to perform a man-in-the-middle (MitM) attack. The vulnerability exists in the JMX Integration when the “…

Continue Reading

Posts navigation

Older posts

Free SIEM tool

  • img1.jpg

Recent Articles

  • Cybersecurity for Connected Aircraft Market including top key players Argus Cyber Security Ltd (Israel), Honeywell Aerospace (United States), SITA (Switzerland) – NeighborWebSJ – NeighborWebSJ January 25, 2021
  • Cyber alarms could stop internet attacks on businesses – Bury Mercury January 25, 2021
  • Our unity is driving growth, says Infosys CEO Salil Parekh January 25, 2021
  • Use-after-free in Delta Electronics ISPSoft January 25, 2021
  • Intel releases its earnings report ahead of schedule due to a “cyber attack” January 25, 2021
  • Police advise public to secure smart home devices amid cyber attacks around the world – The Straits Times January 25, 2021
  • Republic Day sale: Tips to prevent cyber attackers from duping shoppers – DATAQUEST January 25, 2021
  • 2021 Cybersecurity Predictions – TechSpective January 25, 2021
  • The 2020 Year in Cybersecurity Review January 25, 2021
  • Pen Testing By Numbers: Tracking Pen Testing Trends and Challenges January 25, 2021

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Search

Most active Tags

APTFilter AVGNews CERT-LatestNews FSecureNews KasperskyNews Malware McAfeeNews SocialEngineering SophosNews SymantecNews ThreatsActivists ThreatsCybercrime ThreatsEconomic ThreatsStrategic TrendMicroNews VulnerabilitiesAdobe VulnerabilitiesAll VulnerabilitiesApple VulnerabilitiesApplications VulnerabilitiesCisco VulnerabilitiesCrypto VulnerabilitiesDBMS VulnerabilitiesFirmware VulnerabilitiesGoogle VulnerabilitiesHardware VulnerabilitiesLinux VulnerabilitiesMicrosoft VulnerabilitiesMozilla VulnerabilitiesNetwork VulnerabilitiesOracle VulnerabilitiesOS VulnerabilitiesVMWare VulnerabilitiesVOIP
Copyright 2020 - Ken Gilmour
  • Attribution
  • Where I work