MSA-23-0004: Authenticated SQL injection via availability checkby Michael Hawkins. Insufficient validation of profile field availability condition resulted in an SQL injection risk (by default only available...
Month: March 2023
MSA-23-0005: Authenticated arbitrary file read through malformed backup file
MSA-23-0005: Authenticated arbitrary file read through malformed backup fileby Michael Hawkins. Insufficient sanitizing in backup resulted in an arbitrary file read risk. The capability to access...
MSA-23-0013: XSS risk in TinyMCE alerts (upstream)
MSA-23-0013: XSS risk in TinyMCE alerts (upstream)by Michael Hawkins. The TinyMCE editor included with Moodle required a security patch to be applied to fix an XSS...
Stung by Free Decryptor, Ransomware Group Embraces Extortion
Stung by Free Decryptor, Ransomware Group Embraces ExtortionBianLian Follows in Karakurt's Footsteps by Moving Away From Crypto-Locking MalwareNot all ransomware groups wield crypto-locking malware. Some have...
Hackers Are Actively Exploiting Unpatched Adobe ColdFusion
Hackers Are Actively Exploiting Unpatched Adobe ColdFusionExperts Urge Immediate Patching and Reviewing Servers for Signs of CompromiseHackers have been actively exploiting vulnerabilities in ColdFusion to remotely...
Orca Promotes CPO Gil Geron to CEO to Drive Efficient Growth
Orca Promotes CPO Gil Geron to CEO to Drive Efficient GrowthAvi Shua Moves to Chief Innovation Officer Role After Serving as CEO Since FoundingOrca Security has...
DC Health Link Facing Lawsuits in Hack Affecting Congress
DC Health Link Facing Lawsuits in Hack Affecting CongressFallout Grows in Aftermath of Incident Involving Stolen Data Posted on the Dark WebThe DC Health Benefit Exchange...
LockBit 3.0 Ransomware: dentro de la ciberamenaza que cuesta millones
LockBit 3.0 Ransomware: dentro de la ciberamenaza que cuesta millonesLas agencias del gobierno de EE. UU. publicaron un aviso de seguridad cibernética conjunto que detalla los...
El troyano bancario Mispadu apunta a Latinoamérica: más de 90 000 credenciales robadas.
El troyano bancario Mispadu apunta a Latinoamérica: más de 90 000 credenciales robadas.Un troyano bancario denominado Mispadu se ha vinculado a múltiples campañas de spam dirigidas...
US FTC Seeks Information on Cloud Provider Cybersecurity
US FTC Seeks Information on Cloud Provider CybersecurityAgency Solicits Public Comment on Cloud Industry Business PracticesThe U.S. Federal Trade Commission is asking for public comment on...
Emotet está de vuelta después de una pausa de tres meses
Emotet está de vuelta después de una pausa de tres mesesEl malware Emotet está de vuelta después de una breve pausa; los actores de amenazas lo...
Webinar | Why Your SASE Deployment Should Start With ZTNA 2.0
Webinar | Why Your SASE Deployment Should Start With ZTNA 2.0Post ContentRead MoreDataBreachToday.com RSS Syndication
BreachForums Closes Amid Worries Over Law Enforcement Access
BreachForums Closes Amid Worries Over Law Enforcement AccessNew Admin Shuts It Down After Spotting a Suspicious Server Logon SundayDays after federal agents arrested the alleged administrator...
US Charges Bulgarian Woman in $4B OneCoin Fraud Case
US Charges Bulgarian Woman in $4B OneCoin Fraud CaseIrina Dilkinska Allegedly Laundered $400M as Firm's Legal, Compliance HeadA Bulgarian woman extradited to the United States for...
NYC Special Needs Student’s Records Found Exposed on Web
NYC Special Needs Student's Records Found Exposed on WebResearcher Says Database Containing Nearly 50,000 Documents Appears Secure NowNearly 50,000 documents containing personal information of special education...
Google Suspends Chinese App Following Malware Discovery
Google Suspends Chinese App Following Malware DiscoveryGoogle Discovered Malware In Pinduoduo’s Non-Play Store VersionsGoogle suspended popular budget e-commerce application Pinduoduo from the Play Store after detecting...
(Fireside Chat) Policing the Shadows: Uncovering the Darkweb
(Fireside Chat) Policing the Shadows: Uncovering the DarkwebPost ContentRead MoreDataBreachToday.com RSS Syndication
(Panel) Skill Gap in Cybersecurity: Innovative Methods CISOs Are Deploying
(Panel) Skill Gap in Cybersecurity: Innovative Methods CISOs Are DeployingPost ContentRead MoreDataBreachToday.com RSS Syndication
CERT-In Directives – The Status Check
CERT-In Directives – The Status CheckPost ContentRead MoreDataBreachToday.com RSS Syndication
Ransomware Will Target Transport Sector OT, Says ENISA – European Cybersecurity Agency Warns That Digital Extortion Is Coming for OT
Ransomware Will Target Transport Sector OT, Says ENISAEuropean Cybersecurity Agency Warns That Digital Extortion Is Coming for OTEurope's cybersecurity agency predicts hackers will take advantage of...
A Former FBI Agent’s Thoughts: National Cybersecurity Strategy
A Former FBI Agent’s Thoughts: National Cybersecurity Strategy The government just released its new National Cybersecurity Strategy built around five pillars: Pillar One: Defend Critical Infrastructure...
Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’
Robert M. Lee’s & Jeff Haas’ Little Bobby Comic – ‘WEEK 422’ via the respected security expertise of Robert M. Lee and the superlative illustration talents...
[New Live Series] Dev Chat with Dan Conn: Beware of Malware
[New Live Series] Dev Chat with Dan Conn: Beware of Malware The post [New Live Series] Dev Chat with Dan Conn: Beware of Malware appeared...
Women’s History Month at RiskLens: More Voices
Women’s History Month at RiskLens: More Voices For Women’s History Month, we are asking RiskLens staff members for their thoughts on the current status and outlook...
Investing in People Doesn’t Take AI
Investing in People Doesn’t Take AI Investing in People Doesn’t Take AI AI is not an investment; ask any bank. Decisions made by people powered by...
Automate your DevSecOps to take the pressure off triage
Automate your DevSecOps to take the pressure off triage Tools like Code Dx that support automation are the answer to faster software development delivery cadence. The...
Software supply chain security practices are maturing — but it’s a work in progress
Software supply chain security practices are maturing — but it’s a work in progress Many software supply chain security practices have been widely adopted, but there...
USENIX Security ’22 – Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster – ‘How and Why People Use Virtual Private Networks’
USENIX Security ’22 – Agnieszka Dutkowska-Zuk, Austin Hounsel, Amy Morrill, Andre Xiong, Marshini Chetty, Nick Feamster – ‘How and Why People Use Virtual Private Networks’Our thanks...
Security Recruiter Directory
Security Recruiter DirectoryLooking for a qualified candidate or new job? CSO's security recruiter directory is your one-stop shop. The recruiters listed below can help you find...
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprises
ForgeRock, Secret Double Octopus offer passwordless authentication for enterprisesForegeRock is adding a new passwordless authentication capability, called Enterprise Connect Passwordless, to its flagship Identity Platform product...
























