Search Results for “”

Critical Cisco StarOS Bug Grants Root Access via Debug Mode

Cisco issued a critical fix for a flaw in its Cisco RCM for Cisco StarOS Software that could give attackers RCE on the application with root-level privileges.

Microsoft Sees Log4j Attacks Exploiting SolarWinds Serv-U Bug

SolarWinds has fixed a Serv-U bug that threat actors were exploiting to unleash Log4j attacks on networks’ internal devices.

Pervasive Apple Safari Bug Exposes Web-Browsing Data, Google IDs

The information-disclosure issue, affecting Macs, iPhones and iPads, allows a snooping website to find out information about other tabs a user might have open.

Red Cross Begs Attackers Not to Leak 515K People’s Stolen Data

A cyberattack forced the Red Cross to shut down IT systems running the Restoring Family Links system, which reunites families fractured by war, disaster or migration.

SEC Filing Reveals Fortune 500 Firm Targeted in Ransomware Attack

The Fortune 500 integrated services company confirmed a ‘systems intrusion’ that occurred in late December and is still under investigation in an SEC filing.

Destructive Wiper Targeting Ukraine Aimed at Eroding Trust, Experts Say

Disruptive malware attacks on Ukrainian organizations (posing as ransomware attacks) are very likely part of Russia’s wider effort to undermine Ukraine’s sovereignty, according to analysts.

Box 2FA Bypass Opens User Accounts to Attack

A security bug in the file-sharing cloud app could have allowed attackers using stolen credentials to skate by one-time SMS code verification requirements.

Beijing Olympics App Flaws Allow Man-in-the-Middle Attacks

Attackers can access audio and files uploaded to the MY2022 mobile app required for use by all winter games attendees – including personal health details.

Cloned Dept. of Labor Site Hawks Fake Government Contracts

A well-crafted but fake government procurement portal offers the opportunity to submit a bid for lucrative government projects — but harvests credentials instead.

Will 2022 Be the Year of the Software Bill of Materials?

Praise be & pass the recipe for the software soup: There’s too much scrambling to untangle vulnerabilities and dependencies, say a security experts roundtable.