gen Gentoo Linux Security Advisory 202004-02 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:43:57 GMT Gentoo Linux Security Advisory 202004-2 - Multiple vulnerabilities have been found in VirtualBox, the worst of which could allow an attacker to take control of VirtualBox. Versions prior to 6.1.2 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-03 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:45:09 GMT Gentoo Linux Security Advisory 202004-3 - Multiple vulnerabilities have been found in GPL Ghostscript, the worst of which could result in the execution of arbitrary code. Versions prior to 9.28_rc4 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-04 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:45:44 GMT Gentoo Linux Security Advisory 202004-4 - A heap use-after-free flaw in Qt WebEngine at worst might allow an attacker to execute arbitrary code. Versions less than 5.14.1 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-05 By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:46:21 GMT Gentoo Linux Security Advisory 202004-5 - Multiple vulnerabilities have been found in ledger, the worst of which could result in the arbitrary execution of code. Versions less than 3.1.2 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-07 By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:26:49 GMT Gentoo Linux Security Advisory 202004-7 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 74.0.1 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-08 By packetstormsecurity.com Published On :: Sat, 11 Apr 2020 12:12:12 GMT Gentoo Linux Security Advisory 202004-8 - A vulnerability in libssh could allow a remote attacker to cause a Denial of Service condition. Versions less than 0.9.4 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-09 By packetstormsecurity.com Published On :: Tue, 14 Apr 2020 14:47:28 GMT Gentoo Linux Security Advisory 202004-9 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 81.0.4044.92 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-10 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:28:42 GMT Gentoo Linux Security Advisory 202004-10 - Multiple vulnerabilities were found in OpenSSL, the worst of which could allow remote attackers to cause a Denial of Service condition. Versions less than 1.1.1g are affected. Full Article
gen Gentoo Linux Security Advisory 202004-11 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:31:47 GMT Gentoo Linux Security Advisory 202004-11 - Multiple vulnerabilities have been found in Mozilla Firefox, the worst of which could result in the arbitrary execution of code. Versions less than 68.7.0 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-12 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:35:36 GMT Gentoo Linux Security Advisory 202004-12 - Multiple vulnerabilities have been found in Chromium and Google Chrome, the worst of which could allow remote attackers to execute arbitrary code. Versions less than 81.0.4044.122 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-13 By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:36:14 GMT Gentoo Linux Security Advisory 202004-13 - Multiple vulnerabilities have been found in Git which might all allow attackers to access sensitive information. Versions less than 2.26.2 are affected. Full Article
gen U.S. Defense, Intelligence Ramps Up Efforts To Insert Malware In Russia's Grid By packetstormsecurity.com Published On :: Mon, 17 Jun 2019 14:40:45 GMT Full Article headline government usa russia cyberwar scada
gen Urgent11 Security Flaws Impact Routers, Printers, SCADA, And Many IoT Devices By packetstormsecurity.com Published On :: Mon, 29 Jul 2019 16:35:51 GMT Full Article headline hacker flaw scada
gen Hackers Hit US Health Agency During Coronavirus Crisis By packetstormsecurity.com Published On :: Mon, 16 Mar 2020 13:45:12 GMT Full Article headline hacker government usa virus
gen ManageEngine Asset Explorer Windows Agent Remote Code Execution By packetstormsecurity.com Published On :: Fri, 08 May 2020 19:56:17 GMT The ManageEngine Asset Explorer windows agent suffers form a remote code execution vulnerability. All versions prior to 1.0.29 are affected. Full Article
gen MicroStrategy Intelligence Server And Web 10.4 XSS / Disclosure / SSRF / Code Execution By packetstormsecurity.com Published On :: Thu, 02 Apr 2020 14:50:46 GMT MicroStrategy Intelligence Server and Web version 10.4 suffers from remote code execution, cross site scripting, server-side request forgery, and information disclosure vulnerabilities. Full Article
gen Generic Zip Slip Traversal By packetstormsecurity.com Published On :: Thu, 12 Sep 2019 14:36:50 GMT This is a generic arbitrary file overwrite technique, which typically results in remote command execution. This targets a simple yet widespread vulnerability that has been seen affecting a variety of popular products including HP, Amazon, Apache, Cisco, etc. The idea is that often archive extraction libraries have no mitigations against directory traversal attacks. If an application uses it, there is a risk when opening an archive that is maliciously modified, and results in the embedded payload to be written to an arbitrary location (such as a web root), and results in remote code execution. Full Article
gen U.S. Agencies Get Ready For Election Interference By packetstormsecurity.com Published On :: Tue, 03 Mar 2020 14:01:08 GMT Full Article headline government usa russia fraud cyberwar
gen DarkHotel Hackers Use VPN Zero-Day To Breach Chinese Government Agencies By packetstormsecurity.com Published On :: Mon, 06 Apr 2020 18:18:05 GMT Full Article headline hacker government malware virus china cyberwar
gen Gentoo Linux Security Advisory 202004-14 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:20 GMT Gentoo Linux Security Advisory 202004-14 - Multiple vulnerabilities have been found in FontForge, the worst of which could result in the arbitrary execution of code. Versions less than 20200314 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-15 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:27 GMT Gentoo Linux Security Advisory 202004-15 - Multiple vulnerabilities have been found in libu2f-host, the worst of which could result in the execution of code. Versions less than 1.1.10 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-16 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:33 GMT Gentoo Linux Security Advisory 202004-16 - Multiple vulnerabilities have been found in Cacti, the worst of which could result in the arbitrary execution of code. Versions less than 1.2.11 are affected. Full Article
gen Gentoo Linux Security Advisory 202004-17 By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:52:38 GMT Gentoo Linux Security Advisory 202004-17 - Multiple vulnerabilities have been found in Django, the worst of which could result in privilege escalation. Versions less than 2.2.11 are affected. Full Article
gen Western Intelligence Hacked Yandex To Spy On Accounts By packetstormsecurity.com Published On :: Fri, 28 Jun 2019 15:12:22 GMT Full Article headline hacker government usa canada britain russia cyberwar new zealand
gen Gentoo Linux Security Advisory 202003-06 By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:58:36 GMT Gentoo Linux Security Advisory 202003-6 - Multiple vulnerabilities have been found in Ruby, the worst of which could lead to the remote execution of arbitrary code. Versions less than 2.4.9:2.4 are affected. Full Article
gen Gentoo Linux Security Advisory 202003-09 By packetstormsecurity.com Published On :: Sat, 14 Mar 2020 17:08:19 GMT Gentoo Linux Security Advisory 202003-9 - A vulnerability in OpenID library for Ruby at worst might allow an attacker to bypass authentication. Versions less than 2.9.2 are affected. Full Article
gen SunOS 5.10 Generic_147148-26 Local Privilege Escalation By packetstormsecurity.com Published On :: Wed, 15 Jan 2020 23:33:33 GMT SunOS version 5.10 Generic_147148-26 local privilege escalation exploit. A buffer overflow in the CheckMonitor() function in the Common Desktop Environment versions 2.3.1 and earlier and 1.6 and earlier, as distributed with Oracle Solaris 10 1/13 (Update 11) and earlier, allows local users to gain root privileges via a long palette name passed to dtsession in a malicious .Xdefaults file. Full Article
gen Gentoo Linux Security Advisory 202004-06 By packetstormsecurity.com Published On :: Fri, 03 Apr 2020 02:51:49 GMT Gentoo Linux Security Advisory 202004-6 - A regression in GnuTLS breaks the security guarantees of the DTLS protocol. Versions less than 3.6.13 are affected. Full Article
gen iJoomla AdAgency 6.0.9 SQL Injection By packetstormsecurity.com Published On :: Sat, 02 May 2020 16:22:22 GMT iJoomla AdAgency component version 6.0.9 suffers from a remote SQL injection vulnerability. Full Article
gen Team That Made Gene-Edited Babies Sentenced To Prison, Fined By packetstormsecurity.com Published On :: Thu, 02 Jan 2020 16:04:59 GMT Full Article headline china fraud science
gen First Clinical Trial Of Gene Editing To Help Target Cancer By packetstormsecurity.com Published On :: Fri, 07 Feb 2020 13:39:23 GMT Full Article headline science
gen German Spy Agency Warns Of Chinese LinkedIn Espionage By packetstormsecurity.com Published On :: Mon, 11 Dec 2017 15:16:35 GMT Full Article headline government china cyberwar germany spyware social
gen AVIRA Generic Antivirus Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:02:23 GMT AVIRA engine versions below 8.3.54.138 suffer from a generic bypass vulnerability. The parsing engine supports the ISO container format. The parsing engine can be bypassed by specifically manipulating an ISO container so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:06:10 GMT Various Kaspersky products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Fri, 03 Jan 2020 19:07:07 GMT Various ESET products suffer from a malformed archive bypass vulnerability. The parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 21:14:19 GMT The parsing engine in various Kaspersky products supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (Compression Size Flag) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen Kaspersky Generic Archive Bypass By packetstormsecurity.com Published On :: Mon, 13 Jan 2020 18:06:15 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name Length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. A vast array of Kaspersky products are affected. Full Article
gen Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 14 Jan 2020 15:58:50 GMT The Bitdefender parsing engine supports the RAR archive format. The parsing engine can be bypassed by specifically manipulating an RAR Archive (Compressed Size) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. All Bitdefender Products and Vendors that have licensed the Engine before Dec 12, 2019 are affected. Full Article
gen ESET Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Thu, 13 Feb 2020 15:29:59 GMT The ESET parsing engine can be bypassed by specifically manipulating a ZIP Archive Compression Information Field so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen Kaspersky Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 17 Feb 2020 04:44:44 GMT The Kaspersky parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (File Name length Field) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen Bitdefender Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Tue, 18 Feb 2020 11:01:11 GMT The Bitdefender parsing engine supports the GZIP archive format. The parsing engine can be bypassed by specifically manipulating a GZIP Archive (Compression Method) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
gen AVAST Generic Archive Bypass By packetstormsecurity.com Published On :: Wed, 26 Feb 2020 05:02:22 GMT The AVAST parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating a ZIP archive so that it can be accessed by an end-user but not the anti-virus software. The AV engine is unable to scan the container and gives the file a "clean" rating. Full Article
gen QuickHeal Generic Malformed Archive Bypass By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:04:41 GMT The QuickHeal parsing engine supports the ZIP archive format. The parsing engine can be bypassed by specifically manipulating an ZIP Archive (GPFLAG) so that it can be accessed by an end-user but not the Anti-Virus software. The AV engine is unable to scan the archive and issues the file a "clean" rating. Full Article
gen Linux/x86 Bind Shell Generator Shellcode By packetstormsecurity.com Published On :: Mon, 10 Feb 2020 01:11:11 GMT 114 bytes small Linux/x86 bind shell generator shellcode. Full Article
gen Gentoo Linux Security Advisory 202003-57 By packetstormsecurity.com Published On :: Fri, 27 Mar 2020 13:06:15 GMT Gentoo Linux Security Advisory 202003-57 - Multiple vulnerabilities have been found in PHP, the worst of which could result in the execution of arbitrary shell commands. Versions less than 7.4.4 are affected. Full Article
gen Linux/x86 Reverse Shell Generator Shellcode By packetstormsecurity.com Published On :: Fri, 24 Apr 2020 18:32:22 GMT 80 bytes small Linux/x86 reverse shell generator shellcode with customizable TCP port and IP address. Full Article
gen Agent Smith Malware Infects 25 Million Android Phones By packetstormsecurity.com Published On :: Wed, 10 Jul 2019 18:50:09 GMT Full Article headline malware linux phone google
gen ARRIS DG860A WPS PIN Generator By packetstormsecurity.com Published On :: Tue, 15 Oct 2013 13:05:05 GMT This is a ruby script that will generate the default WPS PIN for the Arris DG860A providing you know the HFC MAC address. Full Article
gen Rifatron Intelligent Digital Security System (animate.cgi) Stream Disclosure By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:46:02 GMT The Rifatron Intelligent Digital Security System DVR suffers from an unauthenticated and unauthorized live stream disclosure when animate.cgi script is called through Mobile Web Viewer module. Full Article
gen How Data Intelligence Is Accelerating Innovation for Social Good By feeds.techsoup.org Published On :: Fri, 22 Sep 2017 14:45:00 GMT I am often asked what I see as the biggest potential game-changers in tech — particularly as it relates to social good. Mobile, social, the cloud, and analytics continue to emerge as key themes. However, analytics is emerging as the true game changer — catalyzed by advances in open architecture. Let me unpack what I mean by "open architecture." Open means that anyone can access it, contribute to it, and innovate on top of it. At Blackbaud, where I serve as chief technology officer, one of our core tenets has been to design an open, cloud-based software and data architecture. We're cultivating a technical community of partners, customers, and engineers (inside and outside of the company) who are innovating in different ways and contributing to this ecosystem. From this vantage point, I see the way that openness accelerates the velocity of innovation. Looking at it from a different angle, open ecosystems also yield data and analytics that enable everyone who is part of them to gain more insights and intelligence. This data can power intelligent software solutions, surface actionable events, maintain accurate and current data assets, and generally drive more results for users. In other words, an open cloud-based architecture elevates usage, which in turn generates more and more data and intelligence that make the system even more powerful. With data, analytics, and intelligence in mind, the following capabilities emerge as candidates to have a great positive impact. The Internet of Things Internet of Things (IoT) technology is cheap and accessible and can transform normal household items into network devices that generate data. In my house, the lights, thermostats, appliances, cars, doors, and windows are all connected devices. These connected devices generate data and intelligence (such as trends in usage, optimization of electricity consumption, and so on). Much like a household, there are many IoT possibilities for nonprofits and other players in the social good space to generate valuable, actionable data. Instrumentation Instrumentation provides us with the ability to understand what's happening within our software. As Blackbaud ships features and capabilities within solutions, we monitor usage. We do so to understand if our customers can easily discover the new capability (do they use it the first time they log on?) and to determine if our customers find it valuable (is their use ongoing?). This data-driven approach is an extremely effective way of measuring both the quality of the user experience and the overall value of the work we're doing. We can learn a lot about our customers just by observing what they do. Across the software industry, instrumentation is driving advances in understanding that enable more targeted solutions to users' challenges. Usage Information Like instrumentation, usage data enables us to understand the leading indicators that yield the best, most effective outcomes. For example, through usage data, we were able to understand that nonprofits who proactively thank donors within one week of giving have an advantage. They were much more effective at converting those individuals to longer-term supporters and recurring donors. Predictive Intelligence Predictive analytics showcase some of the most stunning and innovative applications of data. At Blackbaud, we think of predictive analytics as a kind of "self-driving car." It guides and sometimes fully automates tasks for our users, enabling them to gain much greater results. A few examples of predictive analytics scenarios that we're working on include Extending the most compelling message to a specific person at just the right time via the best channel, to keep them engaged, generate a donation, invite them to an event, or simply share a story. Intelligently connecting nonprofits, corporations, individuals, foundations, faith-based organizations, schools, and other stakeholders across the ecosystem we serve. That action enables us to more efficiently coordinate efforts and services and drive greater good together. Leveraging social information, an understanding of a person's network, geographical context, and other analytics to help connect an advocate with a nonprofit, school, or foundation, in just the right way. We leverage the correlation of many different, disparate data sources to drive true intelligence and to power new, predictive user experiences across our applications. Our data platform is what powers this intelligence. This platform drives value across our solutions in other ways, including Correcting, appending, and de-duplicating data across the system Business intelligence and reporting that shows trends in data Real-time data pipelines that spark events across the system based on changes to the data I’ve included only a few examples of technology capabilities we're researching that we believe will have a strong positive impact. The central theme of these capabilities is providing more actionable data and intelligence. Our commitment to delivering a robust, scalable, and flexible data architecture as well as open, cloud-based software enables us to take advantage of this technology. It also enables us to harness these capabilities to drive greater value for the customers we serve. This blog post was written by Mary Beth Westmoreland. spanhidden Full Article nonprofit tech big data artificial intelligence nptech data intelligence