Browsed by
Category: News

Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now

Salt peppered with holes? Automation tool vulnerable to auth bypass: Patch now

The Salt configuration tool patched two vulnerabilities, through which it was easy to expose the Salt installation to the full control of the attacker. The patch has been released, but unfortunately the systems are not automatic updates so they may still be vulnerable.

https://www.theregister.co.uk/2020/04/30/salt_automation_tool_vulnerable_to/

Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump

Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump

The pharmaceutical organization that deals with EcecuPharm clinical trials has been infected with ransomware. During the attack, personal data of employees, social security numbers, personal data of taxpayers, bank accounts, passports and credit cards were disclosed.

https://www.darkreading.com/attacks-breaches/biopharmaceutical-firm-suffers-ransomware-attack-data-dump/d/d-id/1337673

Hackers Exploit Web Application Vulnerabilities to Deploy Malicious Web Shell

Hackers Exploit Web Application Vulnerabilities to Deploy Malicious Web Shell

Malicious cybercriminals use network shells to access victims’ networks. Network shell malware is a significant threat and still difficult to detect by most security tools. Cybercriminals are increasingly using this type of malware.

https://www.cisomag.com/hackers-exploit-web-application-vulnerabilities-to-deploy-malicious-web-shell/

How Can Data Privacy Co-Exist with Data Intelligence in this Age?

How Can Data Privacy Co-Exist with Data Intelligence in this Age?

In today’s world, data plays a significant role. Gadgets that have become our everyday life in a modern way of life collect confidential information about us. When publishing our private information passionately on social media, we must be aware of its use by third parties. Either way, inadequate data protection can have devastating effects.

https://www.cybersecurity-insiders.com/how-can-data-privacy-co-exist-with-data-intelligence-in-this-age/

What’s Your Cybersecurity Architecture Integration Business Plan?

What’s Your Cybersecurity Architecture Integration Business Plan?

In the age of vast numbers of cyber attacks, most companies have dozens of cybersecurity products and tools. Constant changes are caused by the desire to protect the company and keep pace with opponents. The problem is involved, the number of devices will not ensure security until they will cooperate, and what often happens there is no such cooperation.

https://www.darkreading.com/operations/whats-your-cybersecurity-architecture-integration-business-plan/a/d-id/1337609