au Old Banking Trojan TrickBot Has Been Taught New Tricks By packetstormsecurity.com Published On :: Thu, 22 Mar 2018 14:00:11 GMT Full Article headline malware bank trojan cybercrime fraud
au Nagios XI Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 13:17:29 GMT This Metasploit module exploits a vulnerability in Nagios XI versions before 5.6.6 in order to execute arbitrary commands as root. The module uploads a malicious plugin to the Nagios XI server and then executes this plugin by issuing an HTTP GET request to download a system profile from the server. For all supported targets except Linux (cmd), the module uses a command stager to write the exploit to the target via the malicious plugin. This may not work if Nagios XI is running in a restricted Unix environment, so in that case the target must be set to Linux (cmd). The module then writes the payload to the malicious plugin while avoiding commands that may not be supported. Valid credentials for a user with administrative privileges are required. This module was successfully tested on Nagios XI 5.6.5 running on CentOS 7. The module may behave differently against older versions of Nagios XI. Full Article
au Irish Data Protection Authority Rules On Facebook By packetstormsecurity.com Published On :: Thu, 22 Dec 2011 19:57:14 GMT Full Article headline privacy facebook social ireland
au Possible Card Fraud After Loyalty Scheme Breach By packetstormsecurity.com Published On :: Thu, 14 Nov 2013 16:01:33 GMT Full Article headline hacker cybercrime data loss fraud ireland
au Australia Sites Hacked Amid Spying Row With Indonesia By packetstormsecurity.com Published On :: Thu, 21 Nov 2013 16:06:34 GMT Full Article headline hacker government australia spyware anonymous indonesia
au Australia Makes Pinkie-Promise To End Indonesia Spying By packetstormsecurity.com Published On :: Fri, 29 Aug 2014 15:36:15 GMT Full Article headline government australia spyware indonesia
au The Chrome Web Store Is Currently Facing A Wave Of Fraudulent Transactions By packetstormsecurity.com Published On :: Sat, 25 Jan 2020 16:59:37 GMT Full Article headline cybercrime fraud google chrome
au Launcher Execution Mitigation Patch By packetstormsecurity.com Published On :: Fri, 10 Jan 2020 02:33:33 GMT This patch mitigates allowing launcher the ability to execute arbitrary programs. Full Article
au Reddit Gets Caught Censoring By packetstormsecurity.com Published On :: Mon, 21 Apr 2014 19:45:05 GMT Full Article headline censorship
au Former Twitter Employees Charged With Spying On Users For Saudis By packetstormsecurity.com Published On :: Thu, 07 Nov 2019 14:51:02 GMT Full Article headline government cybercrime fraud spyware social saudi arabia twitter
au Authorities Make Arrest Of Alleged Hacker That Hacked Jack Dorsey By packetstormsecurity.com Published On :: Tue, 26 Nov 2019 17:33:34 GMT Full Article headline hacker phone twitter
au Australian Home Affairs Breach Leaks Details On 700,000 Migrants By packetstormsecurity.com Published On :: Mon, 04 May 2020 15:37:08 GMT Full Article headline government privacy australia data loss
au Thousands Of Turkish Twitter OAuth Tokens Leaked By packetstormsecurity.com Published On :: Tue, 20 Aug 2013 15:10:32 GMT Full Article headline hacker data loss flaw turkey social twitter
au Turkish Authorities Block Wikipedia Without Giving Reason By packetstormsecurity.com Published On :: Mon, 01 May 2017 15:47:57 GMT Full Article headline government turkey censorship
au Firefox Turns On Encrypted DNS By Default To Thwart Snooping ISPs By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:05 GMT Full Article headline privacy dns mozilla firefox cryptography
au Open-AudIT 3.2.2 Command Injection / SQL Injection By packetstormsecurity.com Published On :: Wed, 29 Apr 2020 15:39:24 GMT Open-AudIT version 3.2.2 suffers from OS command injection, arbitrary file upload, and remote SQL injection vulnerabilities. Full Article
au XBOX 360 Aurora 0.6b Default Credentials / FTP Bruteforcer By packetstormsecurity.com Published On :: Sun, 24 Dec 2017 00:33:33 GMT XBOX 360 Aurora version 0.6b default credential FTP bruteforcing script. Full Article
au OpenBSD Patches Auth Bypass, Privilege Escalation Vulns By packetstormsecurity.com Published On :: Thu, 05 Dec 2019 16:54:00 GMT Full Article headline flaw bsd patch
au Australian MPs Call On UK To Block US Assange Extradition By packetstormsecurity.com Published On :: Wed, 19 Feb 2020 14:57:28 GMT Full Article headline government usa britain australia data loss cyberwar spyware
au UK To Launch Specialist Cyber Force Able To Target Terror By packetstormsecurity.com Published On :: Fri, 28 Feb 2020 07:05:28 GMT Full Article headline hacker government britain cyberwar terror military
au Delta Industrial Automation DCISoft 1.12.09 Stack Buffer Overflow By packetstormsecurity.com Published On :: Sun, 14 Feb 2016 01:26:22 GMT Delta Industrial Automation DCISoft version 1.12.09 suffers from a stack buffer overflow vulnerability. Full Article
au 281 People Indicted In Massive Email Fraud Scheme By packetstormsecurity.com Published On :: Wed, 11 Sep 2019 13:56:09 GMT Full Article headline government email usa cybercrime fraud fbi
au SQLMAP - Automatic SQL Injection Tool 1.4.5 By packetstormsecurity.com Published On :: Mon, 04 May 2020 17:30:13 GMT sqlmap is an open source command-line automatic SQL injection tool. Its goal is to detect and take advantage of SQL injection vulnerabilities in web applications. Once it detects one or more SQL injections on the target host, the user can choose among a variety of options to perform an extensive back-end database management system fingerprint, retrieve DBMS session user and database, enumerate users, password hashes, privileges, databases, dump entire or user's specified DBMS tables/columns, run his own SQL statement, read or write either text or binary files on the file system, execute arbitrary commands on the operating system, establish an out-of-band stateful connection between the attacker box and the database server via Metasploit payload stager, database stored procedure buffer overflow exploitation or SMB relay attack and more. Full Article
au Cacti 1.2.8 Unauthenticated Remote Code Execution By packetstormsecurity.com Published On :: Mon, 02 Mar 2020 15:42:06 GMT graph_realtime.php in Cacti 1.2.8 allows remote attackers to execute arbitrary OS commands via shell metacharacters in a cookie if a guest user has the graph real-time privilege. Full Article
au Centreon Poller Authenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 15:30:58 GMT This Metasploit module exploits a flaw where an authenticated user with sufficient administrative rights to manage pollers can use this functionality to execute arbitrary commands remotely. Usually, the miscellaneous commands are used by the additional modules (to perform certain actions), by the scheduler for data processing, etc. This module uses this functionality to obtain a remote shell on the target. Full Article
au Linux Kernel Spectre V2 Defense Caused Massive Slowdown By packetstormsecurity.com Published On :: Tue, 20 Nov 2018 15:06:31 GMT Full Article headline linux flaw patch intel
au HWK Wireless Auditing Tool 0.4 By packetstormsecurity.com Published On :: Fri, 18 Oct 2013 01:30:01 GMT hwk is an easy-to-use wireless authentication and de-authentication tool. Furthermore, it also supports probe response fuzzing, beacon injection flooding, antenna alignment and various injection testing modes. Information gathering is selected by default and shows the incoming traffic indicating the packet types. Full Article
au DAWIN - Distributed Audit and Wireless Intrustion Notification By packetstormsecurity.com Published On :: Wed, 17 Sep 2014 22:34:16 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
au DAWIN - Distributed Audit and Wireless Intrustion Notification 2.0 By packetstormsecurity.com Published On :: Tue, 28 Apr 2015 00:52:43 GMT DA-WIN, a wireless IDS, provides an organization a continuous wireless scanning capability that is light touch and simple. It utilizes compact and discreet sensors that can easily be deployed reducing the total cost of protection and simplifying the effort required for absolute, categoric regulatory compliance. This archive includes a dd image to be used on a Raspberry Pi and a user manual. Full Article
au Teltonika RUT9XX Unauthenticated OS Command Injection By packetstormsecurity.com Published On :: Fri, 12 Oct 2018 16:16:15 GMT Teltonika RUT9XX routers with firmware before 00.04.233 are prone to multiple unauthenticated OS command injection vulnerabilities in autologin.cgi and hotspotlogin.cgi due to insufficient user input sanitization. This allows remote attackers to execute arbitrary commands with root privileges. Full Article
au FLIR Systems FLIR Brickstream 3D+ Unauthenticated Config Download File Disclosure By packetstormsecurity.com Published On :: Mon, 15 Oct 2018 16:58:29 GMT The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated config download and file disclosure vulnerability when calling the ExportConfig REST API (getConfigExportFile.cgi). This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and/or full system access. Full Article
au Synaccess netBooter NP-02x / NP-08x 6.8 Authentication Bypass By packetstormsecurity.com Published On :: Mon, 19 Nov 2018 19:09:21 GMT Synaccess netBooter NP-02x and NP-08x version 6.8 suffer from an authentication bypass vulnerability due to a missing control check when calling the webNewAcct.cgi script while creating users. This allows an unauthenticated attacker to create an admin user account and bypass authentication giving her the power to turn off a power supply to a resource. Full Article
au ABB IDAL HTTP Server Authentication Bypass By packetstormsecurity.com Published On :: Fri, 21 Jun 2019 20:32:22 GMT The IDAL HTTP server CGI interface contains a URL, which allows an unauthenticated attacker to bypass authentication and gain access to privileged functions. In the IDAL CGI interface, there is a URL (/cgi/loginDefaultUser), which will create a session in an authenticated state and return the session ID along with the username and plaintext password of the user. An attacker can then login with the provided credentials or supply the string 'IDALToken=......' in a cookie which will allow them to perform privileged operations such as restarting the service with /cgi/restart. Full Article
au D-Link DIR-859 Unauthenticated Remote Command Execution By packetstormsecurity.com Published On :: Wed, 22 Jan 2020 16:26:01 GMT D-Link DIR-859 Routers are vulnerable to OS command injection via the UPnP interface. The vulnerability exists in /gena.cgi (function genacgi_main() in /htdocs/cgibin), which is accessible without credentials. Full Article
au Latvia highlights anti-money laundering efforts By www.fdiintelligence.com Published On :: Thu, 16 Apr 2020 12:04:17 +0000 FDI into Latvia has recovered in recent years as the Baltic state has implemented stricter anti-money laundering procedures. Latvian minister of economics Ralfs Nemiro talks to Alex Irwin-Hunt about the progress made. Full Article
au U.S. Launched Cyberattacks On Iranian Intel Sites By packetstormsecurity.com Published On :: Mon, 24 Jun 2019 16:43:23 GMT Full Article headline government usa cyberwar iran
au US Claims Cyber Strike On Iran After Attack On Saudi Oil Facility By packetstormsecurity.com Published On :: Wed, 16 Oct 2019 14:44:59 GMT Full Article headline government usa cyberwar iran saudi arabia
au TechSoup to Launch New Website and Blog By feeds.techsoup.org Published On :: Thu, 02 Nov 2017 15:14:00 GMT (Please visit the site to view this video) If you're a frequent visitor to our site, you might notice a few changes in the coming weeks. That's because we're making some big improvements and are proud to announce the upcoming launch of the newly redesigned TechSoup.org. As a social enterprise, we never stop working to better serve nonprofits that share in our commitment to building a more equitable planet. In fact, TechSoup currently works with more than 965,000 NGOs in 236 countries and territories and has facilitated over $9 billion in U.S. market value of in-kind technology and funding. To that end, we've created a refreshed, modern web presence to streamline access to all our traditional and beloved products and services. It will also serve as the place where TechSoup technologies and services are first announced. The new TechSoup.org has been optimized for mobile devices, so you'll be able to experience all the new functionality wherever you go. We've also built the site with accessibility in mind on several fronts. And we're launching a new blog. Our new website will officially go live in early November. A Streamlined User Experience Nonprofits who are regular visitors to TechSoup will find a streamlined catalog that makes finding product offers and solutions easier and more efficient. Additionally, the home page has been reconfigured, sending a clearer message of who we are and what we offer as an organization. "We reduced clutter and developed a cleaner, simpler user experience with more breathing room in the interface to encourage users to do what they are intended to do on the site," says TechSoup head of user experience Tyler Benari. "It will now be easier to benefit from offerings available in and out of our catalog, interact with others in the nonprofit community, and gain access to other TechSoup services." Maximized for Mobile TechSoup's updated website will be maximized for mobile devices, allowing nonprofit staffers to take advantage of the many offers on TechSoup.org right from their phone or tablet. "It's an exciting time," Benari says. "We will now be able to literally get TechSoup into more people's hands. Redesigning the site to be more mobile-friendly will allow us to grow our community much faster and better serve the existing nonprofits we love so much." Improved Accessibility The newly redesigned TechSoup.org also features greater accessibility and is informed by Web Content Accessibility 2.0 Guidelines (WCAG). "TechSoup cares very much about accessibility and enabling access for all people," Benari says, describing two key factors that have been improved upon: contrast and code. "Our new color scheme makes it easier for people with impaired vision to access content on the site, and our code was updated to better communicate with screen readers." A New Blog Platform Finally, we're excited to introduce our new blog, more suited to integrate existing TechSoup.org content in a single, easy-to-access location. We've given the platform an upgrade, complete with a fresh look and improved functionality aimed to make blog posts more easily shareable and to promote a more robust multimedia experience. You'll continue to see improvements in the coming months as we receive feedback from the communities we serve. Also, be on the lookout for more information surrounding the new site, including a webinar and short video. spanhidden Full Article
au Low-Orbit Internet Banking Fraud Claim Alleged To Be Space Junk By packetstormsecurity.com Published On :: Thu, 09 Apr 2020 14:33:35 GMT Full Article headline bank space fraud
au CEE ‘key for automotive R&D’ By www.fdiintelligence.com Published On :: Thu, 30 Jan 2020 16:28:39 +0000 Western European carmakers should consider an R&D footprint in CEE, says McKinsey. Full Article
au Serbia's automotive companies drive inward investment By www.fdiintelligence.com Published On :: Thu, 13 Feb 2020 16:41:16 +0000 Foreign investment into Serbia is growing at a healthy pace thanks to its attractive automotive manufacturing industry and highly regarded free zones. Full Article
au US Congress: Spying Law Is Flawed, Open To Abuse, And Lacking In Accountability - So Let's Reauthorize It By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:20 GMT Full Article headline government privacy usa phone spyware nsa
au A Private Spy Was Caught Using A Hacking Tool To Target Their Crush By packetstormsecurity.com Published On :: Fri, 01 May 2020 13:36:43 GMT Full Article headline hacker privacy phone israel spyware
au Brexit uncertainty drives auto industry towards Germany By www.fdiintelligence.com Published On :: Fri, 15 Nov 2019 17:14:11 +0000 Tesla's decision part of broader trend of investment into Germany at UK's expense. Full Article
au Mobility expertise boosts Braunschweig's ambitions By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:01:00 +0000 Despite nurturing its R&D capacity, the city of Braunschweig lags its German peers in attracting FDI. Now it hopes a focus on the mobility sector will mean its technical skills are matched with investment. Full Article
au Auckland’s tourism draws major investment opportunities By www.fdiintelligence.com Published On :: Thu, 07 Nov 2019 13:31:23 +0000 Steve Armitage, general manager of destination at Auckland Tourism, Events and Economic Development explains why the New Zealand city’s international profile is growing so fast. Full Article
au Author Of The SSH Protocol Wants A New One By packetstormsecurity.com Published On :: Thu, 11 Apr 2013 03:02:01 GMT Full Article headline ssh
au Mexico teams up with Singapore to launch Tehuantepec trade corridor By www.fdiintelligence.com Published On :: Thu, 12 Dec 2019 12:00:58 +0000 President Obrador aims to mobilise billions in public and private investment to create an alternative to the Panama Canal along the Tehuantepec corridor. Full Article
au China FDI into Europe: A cause for concern? By www.fdiintelligence.com Published On :: Wed, 24 Apr 2019 15:24:41 +0000 FDI project numbers from China into the EU are on a downward trend, but Europe is still a popular destination for Chinese investment. Full Article
au President inaugurates Bolivia’s 69-MW San Jose II Hydroelectric Plant By feedproxy.google.com Published On :: 2019-06-11T15:00:00Z Bolivian President Evo Morales has inaugurated the 69-MW San Jose II Hydroelectric Power Plant in the municipality of Colomi, department of Cochabamba. Full Article Dam Design and Construction Latin America News Hydropower New Development