MSA-23-0001: Reflected XSS risk in some returnurl parametersby Michael Hawkins. Some returnurl parameters required additional sanitizing to prevent a reflected XSS risk.Severity/Risk:SeriousVersions affected:4.1, 4.0 to 4.0.5,...
Month: January 2023
MSA-23-0003: Possible to set the preferred "start page" of other users
MSA-23-0003: Possible to set the preferred "start page" of other usersby Michael Hawkins. Insufficient limitations on the "start page" preference made it possible to set that...
Cisco Identity Services Engine Insufficient Access Control Vulnerability
Cisco Identity Services Engine Insufficient Access Control VulnerabilityA vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker...
Cisco Identity Services Engine Insufficient Access Control Vulnerability
Cisco Identity Services Engine Insufficient Access Control VulnerabilityA vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker...
What is LockBit ransomware and how does it operate?
What is LockBit ransomware and how does it operate?Name of malware and criminal group behind it, LockBit has been blamed for attack on Royal Mail LockBit...
MSA-23-0002: Reflected XSS risk in blog search
MSA-23-0002: Reflected XSS risk in blog searchby Michael Hawkins. Blog search required additional sanitizing to prevent a reflected XSS risk.Severity/Risk:SeriousVersions affected:4.1 and 4.0 to 4.0.5Versions fixed:4.1.1,...
MP calls for action on crime in ‘under siege’ town – as it happened
MP calls for action on crime in ‘under siege’ town – as it happenedThis blog is now closed. Follow our next Australia news live blog here...
US authorities seize servers for Hive ransomware group
US authorities seize servers for Hive ransomware group‘We hacked the hackers,’ says deputy attorney general of group that has received over $100m in extortion payments from...
Cisco Identity Services Engine Vulnerabilities
Cisco Identity Services Engine VulnerabilitiesMultiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security...
Cisco Identity Services Engine Vulnerabilities
Cisco Identity Services Engine VulnerabilitiesMultiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security...
Australia to consider European-style right to be forgotten privacy laws
Australia to consider European-style right to be forgotten privacy lawsAttorney general promises ‘whole range’ of modernisations of the Privacy Act to follow new customer data protection...
Fake text messages on the rise, but experts warn Australians most losses are from more sophisticated scams
Fake text messages on the rise, but experts warn Australians most losses are from more sophisticated scamsFake cryptocurrency or forex broker websites the most common scam...
JD Sports hit by cyber-attack that leaked 10m customers’ data
JD Sports hit by cyber-attack that leaked 10m customers’ dataRetail group says incident affected shoppers at JD, Size?, Millets, Blacks, Scotts and Millets Sport brands The...
Cisco Identity Services Engine Vulnerabilities
Cisco Identity Services Engine VulnerabilitiesMultiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security...
Cisco Identity Services Engine Vulnerabilities
Cisco Identity Services Engine VulnerabilitiesMultiple vulnerabilities in Cisco Identity Services Engine (ISE) could allow an authenticated, remote attacker to inject arbitrary operating system commands, bypass security...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Ukraine Links Media Center Attack to Russian Intelligence
Ukraine Links Media Center Attack to Russian IntelligenceSandworm Group Hackers Used Malware Wipers to Disrupt Cybersecurity Press BriefingUkraine traced a cyberattack that delayed a press briefing...
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of Charge
Eliminating SaaS Shadow IT is Now Available via a Self-Service Product, Free of ChargeThe use of software as a service (SaaS) is experiencing rapid growth and...
Microsoft Urges Customers to Secure On-Premises Exchange Servers
Microsoft Urges Customers to Secure On-Premises Exchange ServersMicrosoft is urging customers to keep their Exchange servers updated as well as take steps to bolster the environment,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Federal Agencies Infested by Cyberattackers via Legit Remote Management Systems
Federal Agencies Infested by Cyberattackers via Legit Remote Management SystemsHackers don't need a key to get past your defenses if they can essentially teleport using RMMs,...
Ransomware Profits Dip as Fewer Victims Pay Extortion
Ransomware Profits Dip as Fewer Victims Pay ExtortionAs Funding From Ransoms Goes Down, Gangs Embrace Re-Extortion, Researchers WarnBad news for ransomware groups: Experts find it's getting...
What Makes Sumo Logic an Appealing Target for Private Equity
What Makes Sumo Logic an Appealing Target for Private EquitySumo Logic Is a Well-Regarded SIEM Provider, But Profitability Remains ElusiveThoma Bravo, Vista Equity Partners and rival...
Why Healthcare Orgs Must Prioritize 3rd-Party Risk Management
Why Healthcare Orgs Must Prioritize 3rd-Party Risk ManagementVenminder CEO James Hyde on Reducing Risk Exposure From Vendor RelationshipsWith breaches on the rise and the average cost...
Targets of Opportunity: How Ransomware Groups Find Victims
Targets of Opportunity: How Ransomware Groups Find VictimsWhile Some Sectors Are More Prized Than Others, Profits Trump All ConsiderationsAs ransomware continues to pummel numerous sectors, and...
Securing the SaaS Layer
Securing the SaaS LayerIn this episode of "Cybersecurity Unplugged," Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized...
David Derigiotis on the Complex World of Cyber Insurance
David Derigiotis on the Complex World of Cyber InsuranceIn this episode of "Cybersecurity Unplugged," David Derigiotis of insurtech Embroker discusses the complex world of cyber liability...
Protecting the Hidden Layer in Neural Networks
Protecting the Hidden Layer in Neural NetworksIn this episode of "Cybersecurity Unplugged," Chris "Tito" Sestito discusses technology to protect neural networks and artificial intelligence and machine-learning...