Aug 19 2020

FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

Category: Linux Security,Security vulnerabilitiesDISC @ 11:40 am

Researchers spotted a new sophisticated peer-to-peer (P2P) botnet, dubbed FritzFrog, that has been actively targeting SSH servers since January 2020.

Source: FritzFrog cryptocurrency P2P botnet targets Linux servers over SSH

 

Download a Security Risk Assessment Steps paper!

Security Risk assessment Quiz – Find Out How Your security risk assessment Stands Up!

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles

Subscribe to DISC InfoSec blog by Email

👉 Download a Virtual CISO (#vCISO) and Security Advisory Fact Sheet & Cybersecurity Cheat Sheet


Aug 17 2020

Google Chrome will warn users when submitting insecure forms

Category: Security Awareness,Security vulnerabilitiesDISC @ 11:24 am

Google Chrome will warn users when submitting insecure forms that deliver information via HTTP connections on HTTPS websites starting with version 86.

Source: Google Chrome will warn users when submitting insecure forms

 

Download a Security Risk Assessment Steps paper!

Security Risk assessment Quiz – Find Out How Your security risk assessment Stands Up!

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles

Subscribe to DISC InfoSec blog by Email

👉 Download a Virtual CISO (#vCISO) and Security Advisory Fact Sheet & Cybersecurity Cheat Sheet


Aug 15 2020

PoC exploit code for two Apache Struts 2 flaws available online

Category: Security vulnerabilitiesDISC @ 11:37 am

Security researchers have discovered a PoC code and exploit available online that can be used to trigger unpatched security flaws in Apache Struts 2.

Security researchers have discovered a PoC code and exploit available on GitHub that that can be used to trigger the security vulnerabilities in Apache Struts 2.

The Proof-of-concept exploit code was released last week, it allows to trigger the CVE-2019-0230 and CVE-2019-0233 vulnerabilities in Apache Struts 2 that are classified as remote code-execution and denial-of-service issues respectively. Both vulnerabilities were addressed by the Apache team in November 2019.

According to an advisory published by the Cybersecurity and Infrastructure Security Agency (CISA) the two flaws impact Apache Struts versions 2.0.0 through 2.5.20. The Apache Struts Security Team urges administrators to upgrade their installs to Struts 2.5.22.

Apache Struts 2 is an open-source, extensible framework for creating enterprise-ready Java web applications.

Unpatched installs could allow attackers to carry out malicious activities. In 2017, the credit reporting agency Equifax suffered a massive data breach, attackers exploited the CVE-2017-5638 Apache Struts vulnerability.

The CVE-2019-0230, for which a PoC exploit code is available only, could be triggered when a threat actor sends a malicious Object-Graph Navigation Language (OGNL) expression that can result in a remote code-execution in the context of the affected application.

Depending on the privileges associated with the affected application, an attacker could perform multiple malicious activities, such as install applications; modify or delete data, or create new admin accounts.

The DoS flaw, tracked as CVE-2019-0233, affects the write permissions of file directories that could lead to conditions ripe for a DoS attack.

According to the Apache Struts Wiki description of the bug, this flaw can be triggered with a file upload to a Strut’s Action that exposes the file.

“When a file upload is performed to an Action that exposes the file with a getter, an attacker may manipulate the request such that the working copy of the uploaded file is set to read-only. As a result, subsequent actions on the file will fail with an error.” reads the advisory. “It might also be possible to set the Servlet container’s temp directory to read only, such that subsequent upload actions will fail,”

The Apache security bulletin recommends to upgrade outdated installs and verify no unauthorized system modifications have occurred on the system.

Source: PoC exploit code for two Apache Struts 2 flaws available online

Download a Security Risk Assessment Steps paper!

Security Risk assessment Quiz – Find Out How Your security risk assessment Stands Up!

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles

Subscribe to DISC InfoSec blog by Email

👉 Download a Virtual CISO (#vCISO) and Security Advisory Fact Sheet & Cybersecurity Cheat Sheet

 


Aug 12 2020

If you haven’t yet patched this critical hole in SAP NetWeaver Application Server, today is not your day

Category: Security vulnerabilitiesDISC @ 1:32 pm

Full details of security vuln plus proof-of-concept exploits revealed

This critical-severity bug – scoring 9.9 out of 10 on the CVSS v3 meter – can be exploited by a rogue authenticated user, or someone whose access has been hijacked, to inject arbitrary code into an application server. This means they can run malicious commands they shouldn’t be able to on the server, download sensitive information, or crash the installation.

“In consequence, an attacker can break out of the desired syntactic instructions. Injecting ABAP code in the VALUE field allows the attacker to manipulate the source code of the generated subroutine pool and thereby the execution logic of the entire module. Since the attacker can freely choose the characters that can be used in this field, arbitrary ABAP code can be injected.

“To exploit this behavior an attacker can supply special characters like ‘ and . to escape the string quotation that is built into the source code. Afterwards, an attacker can simply specify any semantically valid ABAP code that gets executed by the application server.”

Source: If you haven’t yet patched this critical hole in SAP NetWeaver Application Server, today is not your day

 

Download a Security Risk Assessment Steps paper!

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles

Subscribe to DISC InfoSec blog by Email

👉 Download a Virtual CISO (#vCISO) and Security Advisory Fact Sheet & Cybersecurity Cheat Sheet


Jul 10 2020

Someone’s scanning gateways, looking for those security holes Citrix told you not to worry too much about

Category: Security vulnerabilitiesDISC @ 11:10 am

FYI: Someone’s scanning gateways, looking for those security holes Citrix told you not to worry too much about

Hackers hit honeypots hours after CISO downplays risk, proof-of-concept exploit code emerges.

Source: FYI: Someone’s scanning gateways, looking for those security holes Citrix told you not to worry too much about





Explore the subject of Cyber Attack

Download a Security Risk Assessment Steps paper!

Subscribe to DISC InfoSec blog by Email

Take an awareness quiz to test your basic cybersecurity knowledge

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles


Jul 08 2020

Google open-sources Tsunami vulnerability scanner

Category: Security Risk Assessment,Security vulnerabilitiesDISC @ 10:03 pm

Google says Tsunami is an extensible network scanner for detecting high-severity vulnerabilities with as little false-positives as possible.

Source: Google open-sources Tsunami vulnerability scanner | ZDNet

The scanner has been used internally at Google and has been made available on GitHub

Google Tsunami Security Scanner – Quick install an example run
httpv://www.youtube.com/watch?v=Xims19547gs

InfoSec Threats, Books and Training Courses

Download a Security Risk Assessment Steps paper!

Subscribe to DISC InfoSec blog by Email

Take an awareness quiz to test your basic cybersecurity knowledge

DISC InfoSec 🔒 securing the business 🔒 via latest InfoSec titles

Tags: vulnerability scanner


Jun 27 2020

Good Cyber Hygiene in a Post-Pandemic World Starts with Us

Category: cyber security,Security vulnerabilitiesDISC @ 1:00 pm

Three ways that security teams can improve processes and collaboration, all while creating the common ground needed to sustain them.

Source: Good Cyber Hygiene in a Post-Pandemic World Starts with Us

Cyber ‘hygiene’ could resolve 90% of cyber attacks | FT Business Notebook
httpv://www.youtube.com/watch?v=3Qm0NgDBR3w

Download a Security Risk Assessment steps paper!

Download a vCISO template

Subscribe to DISC InfoSec blog by Email

Take an awareness quiz to test your basic cybersecurity knowledge


Aug 12 2019

Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

Category: Security vulnerabilitiesDISC @ 10:29 am

Researchers discovered multiple flaws in more than 40 drivers from at least 20 different vendors that could to install a persistent backdoor on Windows PCs.

Source: Flaws in device drivers from 20 vendors allow hackers to install a persistent backdoor

The security flaw in more than 40 Device Drivers from 20 hardware vendors


Subscribe to DISC InfoSec blog by Email


Aug 05 2019

The scramble to secure America’s voting machines

Category: Security vulnerabilities,Voting MachineDISC @ 11:04 pm

Paperless voting devices are a gaping weakness in the patchwork U.S. election system, security experts say. But states and counties are making uneven progress in replacing them, a POLITICO survey reveals.

Source: The scramble to secure America’s voting machines

America’s Voting Machines Are Extremely Vulnerable to Hacking | NowThis


Enter your email address:

Delivered by FeedBurner

Tags: Secure election, Voting machine


Mar 19 2019

These are the top ten security vulnerabilities most exploited by hackers | ZDNet

Category: Security vulnerabilitiesDISC @ 12:26 pm

But one simple thing could help stop the vast majority of these attacks, say researchers.

Source: These are the top ten security vulnerabilities most exploited by hackers | ZDNet



« Previous Page