con Cisco Content Security Management Virtual Appliance M600V IronPort Header Injection By packetstormsecurity.com Published On :: Wed, 04 Sep 2019 14:09:14 GMT Cisco Content Security Management Virtual Appliance M600V IronPort remote host header injection exploit. Full Article
con Cisco Content Security Virtual Appliance M380 IronPort Remote Cross Site Host Modification By packetstormsecurity.com Published On :: Mon, 09 Sep 2019 23:12:10 GMT Cisco Content Security Virtual Appliance M380 IronPort remote cross site host modification demo exploit. Full Article
con Cisco Unified Contact Center Express Privilege Escalation By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:26:11 GMT Cisco Unified Contact Center Express suffers from a privilege escalation vulnerability. Full Article
con Cisco AnyConnect Secure Mobility Client 4.8.01090 Privilege Escalation By packetstormsecurity.com Published On :: Tue, 21 Apr 2020 20:36:17 GMT Cisco AnyConnect Secure Mobility Client for Windows version 4.8.01090 suffer from a privilege escalation vulnerability due to insecure handling of path names. Full Article
con Emotet Trojan Evolves To Spread Via A WiFi Connection By packetstormsecurity.com Published On :: Tue, 11 Feb 2020 15:34:01 GMT Full Article headline malware trojan wireless
con FSB Contractor Breach Exposes Secret Cyber Weapons Program By packetstormsecurity.com Published On :: Tue, 24 Mar 2020 14:15:28 GMT Full Article headline government russia cyberwar
con Microsoft Refuses To Hand Over Foreign Data, Held In Contempt Of Court By packetstormsecurity.com Published On :: Fri, 12 Sep 2014 23:17:13 GMT Full Article headline government privacy microsoft usa data loss spyware ireland
con conntrack-tools Bash Completion 1.0 By packetstormsecurity.com Published On :: Mon, 18 Apr 2016 04:44:44 GMT This is bash programmable completion for the conntrack-tools from netfilter.org. The package contains completions for conntrack, conntrackd, and nfct. Full Article
con Google's China Search Project Concerns US Lawmakers By packetstormsecurity.com Published On :: Sun, 16 Sep 2018 03:38:39 GMT Full Article headline government usa china google censorship
con Russia To Disconnect From The Internet As Part Of A Test By packetstormsecurity.com Published On :: Mon, 11 Feb 2019 15:58:06 GMT Full Article headline government russia censorship
con DigiCert Hit By Hackers Through Buggy Config Tool By packetstormsecurity.com Published On :: Tue, 05 May 2020 16:03:11 GMT Full Article headline hacker flaw password cryptography
con LANCOM WLAN Controller Cross Site Scripting By packetstormsecurity.com Published On :: Thu, 07 May 2020 15:34:10 GMT LANCOM WLAN Controller suffers from multiple cross site scripting vulnerabilities. Multiple versions and firmware are affected. Full Article
con Pwn2Own Expands Into Industrial Control Systems Hacking By packetstormsecurity.com Published On :: Tue, 29 Oct 2019 13:47:52 GMT Full Article headline hacker canada conference scada
con Pwn2Own Contest Yields 13 Bugs, As Virtual Format Expands Talent Pool By packetstormsecurity.com Published On :: Mon, 23 Mar 2020 14:27:38 GMT Full Article headline hacker canada conference
con Xcon2005_San.pdf By packetstormsecurity.com Published On :: Wed, 31 Aug 2005 10:17:25 GMT Xcon 2005: Hacking Windows CE Full Article
con NTR ActiveX Control Check() Method Buffer Overflow By packetstormsecurity.com Published On :: Sat, 22 Sep 2012 06:44:12 GMT This Metasploit module exploits a vulnerability found in NTR ActiveX 1.1.8. The vulnerability exists in the Check() method, due to the insecure usage of strcat to build a URL using the bstrParams parameter contents, which leads to code execution under the context of the user visiting a malicious web page. In order to bypass DEP and ASLR on Windows Vista and Windows 7 JRE 6 is needed. Full Article
con Ransomware Scumbags Release Confidential Docs By packetstormsecurity.com Published On :: Fri, 10 Apr 2020 16:10:02 GMT Full Article headline hacker malware data loss
con Valve Confirms CS:GO, Team Fortress 2 Source Code Leak By packetstormsecurity.com Published On :: Thu, 23 Apr 2020 19:15:19 GMT Full Article headline hacker data loss
con SAPUI5 1.0.0 / SAP Gateway 7.5 / 7.51 / 7.52 / 7.53 Content Spoofing By packetstormsecurity.com Published On :: Tue, 16 Jul 2019 02:22:22 GMT SAPUI5 version 1.0.0 and the SAP Gateway versions 7.5, 7.51, 7.52 and 7.53are vulnerable to content spoofing in multiple parameters. Full Article
con Open-Xchange OX App Suite Content Spoofing / Cross Site Scripting By packetstormsecurity.com Published On :: Fri, 16 Aug 2019 21:17:15 GMT Open-Xchange OX App Suite suffers from a content spoofing, cross site scripting, and information disclosure vulnerabilities. Versions affected vary depending on the vulnerability. Full Article
con CurveBall Microsoft Windows CryptoAPI Spoofing Proof Of Concept By packetstormsecurity.com Published On :: Thu, 16 Jan 2020 16:16:02 GMT This is a proof of concept exploit that demonstrates the Microsoft Windows CryptoAPI spoofing vulnerability as described in CVE-2020-0601 and disclosed by the NSA. Full Article
con PTP-RAT Screen Share Proof Of Concept By packetstormsecurity.com Published On :: Thu, 09 Nov 2017 05:22:22 GMT PTP-RAT is a proof of concept that allows data theft via screen-share protocols. Each screen flash starts with a header. This contains a magic string, "PTP-RAT-CHUNK" followed by a sequence number. When the receiver is activated, it starts taking screenshots at twice the transmission frequency (the Nyquist rate). When it detects a valid header, it decodes the pixel colour information and waits on the next flash. As soon as a valid header is not detected, it reconstructs all the flashes and saves the result to a file. To transfer a file, you run an instance of the Rat locally on your hacktop, and set that up as a receiver. Another instance is run on the remote server and this acts as a sender. You simply click on send file, and select a file to send. The mouse pointer disappears and the screen begins to flash as the file is transmitted via the pixel colour values. At the end of the transfer, a file-save dialog appears on the receiver, and the file is saved. Full Article
con The US Army Just Contracted With A UFO Group To Study Alien Alloys By packetstormsecurity.com Published On :: Sat, 19 Oct 2019 15:37:02 GMT Full Article headline government usa space science military
con Coronavirus Lockdowns: 24 Hours Of Confusion Around The World By packetstormsecurity.com Published On :: Wed, 18 Mar 2020 14:37:49 GMT Full Article headline government virus science
con Labour Party Confirms Cyber Attack Was DDoS By packetstormsecurity.com Published On :: Tue, 12 Nov 2019 15:24:15 GMT Full Article headline government britain denial of service
con UK Financial Watchdog Leaked Confidential Consumer Data By packetstormsecurity.com Published On :: Tue, 25 Feb 2020 15:00:10 GMT Full Article headline government privacy britain data loss
con UK Privacy Advocates Warn Over COVID-19 Contact Tracing App By packetstormsecurity.com Published On :: Thu, 30 Apr 2020 14:45:42 GMT Full Article headline government privacy virus phone britain
con Tele Columbus Confirms Hacker Attack On Customers By packetstormsecurity.com Published On :: Mon, 06 Nov 2017 14:23:02 GMT Full Article headline hacker privacy phone data loss germany
con 20 Year Old Man Confesses In German Data Leak By packetstormsecurity.com Published On :: Tue, 08 Jan 2019 15:08:41 GMT Full Article headline hacker government privacy data loss germany
con French Hospital Contracts 6,000 PC-Locking Ransomware Infections By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:15 GMT Full Article headline malware cybercrime fraud france terror cryptography
con Air Contacts Lite Denial Of Service By packetstormsecurity.com Published On :: Thu, 10 Mar 2011 22:42:22 GMT The Air Contacts Lite iPhone / iPod application suffers from a denial of service vulnerability. Full Article
con Twitter 5.0 Eavesdropping Proof Of Concept By packetstormsecurity.com Published On :: Thu, 22 Nov 2012 18:22:22 GMT The Twitter 5.0 application for iPhone grabs images over HTTP and due to this, allows for a man in the middle attack / image swap. Proof of concept included. Full Article
con Facebook Uploaded Email Contacts For 1.5m Users Without Consent By packetstormsecurity.com Published On :: Thu, 18 Apr 2019 13:07:20 GMT Full Article headline privacy email data loss fraud facebook social
con Island Economies of the Future 2019/20 – the results By www.fdiintelligence.com Published On :: Mon, 10 Jun 2019 07:26:23 +0000 Cyprus is ranked first in fDi’s Island Economies of the Future rankings, followed by the Dominican Republic and Sri Lanka. Cathy Mullan and Naomi Davies detail the results. Full Article
con Russia most diversified commodity economy for the fourth year By www.fdiintelligence.com Published On :: Thu, 15 Aug 2019 11:00:45 +0000 Russia remains fDi’s most diversified commodity economy, while second ranked Brazil has displaced Ukraine into third place. Cathy Mullan reports. Full Article
con Container Escape Hack Targets Vulnerable Linux Kernel By packetstormsecurity.com Published On :: Mon, 04 Mar 2019 15:36:46 GMT Full Article headline linux flaw
con Windows, Ubuntu, macOS, VirtualBox Fall At Pwn2Own Hacking Contest By packetstormsecurity.com Published On :: Fri, 20 Mar 2020 15:12:03 GMT Full Article headline microsoft linux flaw apple conference
con FLIR Systems FLIR Brickstream 3D+ Unauthenticated Config Download File Disclosure By packetstormsecurity.com Published On :: Mon, 15 Oct 2018 16:58:29 GMT The FLIR Brickstream 3D+ sensor is vulnerable to unauthenticated config download and file disclosure vulnerability when calling the ExportConfig REST API (getConfigExportFile.cgi). This will enable the attacker to disclose sensitive information and help her in authentication bypass, privilege escalation and/or full system access. Full Article
con APT33 Is Targeting Industrial Control Systems By packetstormsecurity.com Published On :: Sun, 24 Nov 2019 20:33:11 GMT Full Article headline hacker government cyberwar iran scada
con Egypt planning minister strives for sustainable economic growth By www.fdiintelligence.com Published On :: Mon, 20 Jan 2020 09:50:08 +0000 Egypt is well on the way to establishing a diversified economy, claims Hala El Saeed, minister of planning and economic development Full Article
con Tanzanian tourism boom undermined by investor concerns By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:27:06 +0000 Tanzania's economy is booming and its tourism sector is thriving. However, concerns about the president's strong-arm tactics and delays in the completion of key infrastructure projects are threatening this growth. Full Article
con How the Suez Canal Economic Zone is aiding Egypt's economic resurgence By www.fdiintelligence.com Published On :: Tue, 25 Feb 2020 13:13:41 +0000 Combining a strategic location with an investor-friendly environment, Egypt is ensuring its Suez Canal Economic Zone is primed for foreign investment. Full Article
con Favicons Found Housing Credit Card Skimming Malware By packetstormsecurity.com Published On :: Fri, 08 May 2020 14:23:15 GMT Full Article headline malware bank cybercrime fraud
con Verisk Maplecroft report predicts civil unrest to continue in 2020 By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:49:05 +0000 Escalation in protests across the globe in 2019 are forecast to persist into the new decade, according to Verisk Maplecroft report. Full Article
con Climate concerns top long-term WEF risks for first time By www.fdiintelligence.com Published On :: Thu, 16 Jan 2020 12:59:12 +0000 Severe threats to the environment accounted for all of the five most likely long-term risks in the WEF’s Global Risks Report 2020. Full Article
con Safari Webkit Proxy Object Type Confusion By packetstormsecurity.com Published On :: Sun, 02 Jun 2019 15:30:59 GMT This Metasploit module exploits a type confusion bug in the Javascript Proxy object in WebKit. The DFG JIT does not take into account that, through the use of a Proxy, it is possible to run arbitrary JS code during the execution of a CreateThis operation. This makes it possible to change the structure of e.g. an argument without causing a bailout, leading to a type confusion (CVE-2018-4233). The type confusion leads to the ability to allocate fake Javascript objects, as well as the ability to find the address in memory of a Javascript object. This allows us to construct a fake JSCell object that can be used to read and write arbitrary memory from Javascript. The module then uses a ROP chain to write the first stage shellcode into executable memory within the Safari process and kick off its execution. The first stage maps the second stage macho (containing CVE-2017-13861) into executable memory, and jumps to its entrypoint. The CVE-2017-13861 async_wake exploit leads to a kernel task port (TFP0) that can read and write arbitrary kernel memory. The processes credential and sandbox structure in the kernel is overwritten and the meterpreter payloads code signature hash is added to the kernels trust cache, allowing Safari to load and execute the (self-signed) meterpreter payload. Full Article
con Spying Concerns Raised Over Iran's Official COVID-19 App By packetstormsecurity.com Published On :: Tue, 10 Mar 2020 12:56:35 GMT Full Article headline government malware virus spyware iran
con US Congress: Spying Law Is Flawed, Open To Abuse, And Lacking In Accountability - So Let's Reauthorize It By packetstormsecurity.com Published On :: Fri, 13 Mar 2020 14:49:20 GMT Full Article headline government privacy usa phone spyware nsa
con Coronavirus: Under Surveillance And Confined At Home In Taiwan By packetstormsecurity.com Published On :: Wed, 25 Mar 2020 14:05:27 GMT Full Article headline government privacy phone china spyware
con Covid-19 likely to reverse Middle East consulting gains By www.fdiintelligence.com Published On :: Wed, 08 Apr 2020 11:16:46 +0000 Consulting firms in the Middle East are likely to take a hit in 2020 due to the coronavirus, after two strong years. Full Article