Wednesday, February 20, 2019
  • Google +
  • Linkedin
  • Twitter
  • Email
  • Where I work
  • Advertise here
  • Free SIEM solution

Security Newsfeeds

Cyber Security Newsfeeds from around the world

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Security Analytics

Category: VulnerabilitiesMozilla

Continued attacks by Tick/Bronze Butler against Japan / Attack group targeting Japanese organization by attack group Tick

February 19, 2019 Cyber Crime Monitoring Bot

JPCert/CC introduced the malware Datper, which is thought to be used by the attack group Tick [1] (also called BRONZE BUTLER [2] ) in the previous JPCERT / CC Eyes , but the attacks considered to be related to this attack group are still It continues. …

Continue Reading

Joomla JWallPapers Components 2.0.1 CSRF Backdoor Access Vulnerability

February 19, 2019 Cyber Crime Monitoring Bot

#################################################################### # Exploit Title : Joomla JWallPapers Components 2.0.1 CSRF Backdoor Access Vulnerability # Author [ Discovered By ] : KingSkrupellos # Team : Cyberizm Digital Security Army # Date : 1…

Continue Reading

Data-spewing Spectre chip flaws can’t be killed by software alone, Google boffins conclude

February 18, 2019 Cyber Crime Monitoring Bot

Google security researchers have analyzed the impact of the data-leaking Spectre vulnerabilities afflicting today’s processor cores, and concluded software alone cannot prevent exploitation. The Chocolate Factory brainiacs – Ross Mcilroy, Jaroslav Sevc…

Continue Reading

SSL/TLS Attacks, Part 3: Who’s at Risk from Compromised Digital Certificates?

February 15, 2019 Strategic Intel Monitoring Bot

kdobieski Fri, 02/15/2019 – 09:12.

So, who is most at risk from such attacks? These certificate attacks threaten a range of organizations, starting with the certificate authority (CA) to governments and large enterprises. Certificate Authorities. Cybe…

Continue Reading

Critical OkCupid Flaw Exposes Daters to App Takeovers

February 14, 2019 Cyber Crime Monitoring Bot

The newly disclosed vulnerability is incredibly easy to exploit, and yet has serious consequences: Attackers can monitor the app’s usage, read all messages and even track the victim’s geographic location, researchers with Checkmarx, who discovered the …

Continue Reading

Mozilla Releases Security Updates for Firefox

February 14, 2019 Cyber Crime Monitoring Bot

Original release date: February 12, 2019. Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system.The National Cybe…

Ori…

Continue Reading

Multiple vulnerabilities in Firefox ESR

February 13, 2019 Cyber Crime Monitoring Bot

1) Use-after-free error Description. The vulnerability allows a remote attacker to cause DoS condition on the target system. The weakness exists due to use-after-free error in Skia when handling malicious input. A remote attacker can trick the victim i…

Continue Reading

February 2019

February 13, 2019 Cyber Crime Monitoring Bot

Ongoing Campaigns. EXE files used to infect Mac devices with malware Trend Micro researchers observed a new method of infecting macOS devices with malware that consists of running executable files that normally only execute on Windows devices. They wer…

Continue Reading

Mozilla Releases Security Updates for Firefox

February 13, 2019 Cyber Crime Monitoring Bot

Mozilla has released security updates to address vulnerabilities in Firefox and Firefox ESR. An attacker could exploit some of these vulnerabilities to take control of an affected system. The National Cybersecurity and Communications Integration Center…

Continue Reading

New attack removes TLS protocol encryption

February 11, 2019 Cyber Crime Monitoring Bot

This new attack is also functional against the recently released TLS 1.3 protocol. A new cryptographic attack capable of disrupting the encrypted (TLS) traffic has been discovered; according to network security and ethical hacking specialists from the …

Continue Reading

Posts navigation

Older posts

Recent Articles

  • APAC should bet big on drone deliveries says Frost & Sullivan February 20, 2019
  • Understanding the Darknet and Its Impact on Cybersecurity – Security Boulevard February 20, 2019
  • North Korea’s Lazarus Group Targets Russian Companies For First Time February 20, 2019
  • ExtraHop BrandVoice: Your Enterprise Network Is Haunted — Here’s How To Banish The Darkspace February 20, 2019
  • Bring Automation to your HSM Key Orchestration February 20, 2019
  • CrowdStrike: Nation-state cyber operations gaining steam February 20, 2019
  • Research: Tor and the blockchain – Cybercriminals’ unmatchable combination February 20, 2019
  • The Hackett Group Announces Fourth Quarter and Fiscal 2018 Results February 20, 2019
  • Chinese Hackers Expand Attacks Amid US Anti-Huawei Push – pymnts.com February 20, 2019
  • Why international law is failing to keep pace with technology in preventing cyber attacks – The Conversation AU February 20, 2019

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Ken Gilmour | Theme: News Portal by Mystery Themes.