NCSC-FI News followup

Daily NCSC-FI news followup 2019-12-20

267 miljoonan Facebook-käyttäjän tiedot päätyivät nettiin – älä silti hätäile Vuoto ei kuitenkaan ole hälyttävin mahdollinen, vaikka koskeekin suurta määrää käyttäjiä. Tietueessa ei esimerkiksi ole salasanoja tai maksukortin tietoja. Lisäksi tiedot ovat enimmäkseen amerikkalaisilta käyttäjiltä.. Src:

Supo: 5g-verkkotoimijat arvioitava ja poliittinen keskustelu käytävä

Cisco ASA DoS Bug Attacked in Wild Cisco Talos has recently noticed a sudden spike in exploitation attempts against a specific vulnerability. The attacker can use a specially crafted URL to cause the ASA appliance to reboot or disclose unauthenticated information.

Frankfurt city officials take down IT network to prevent Emotet to be used as a staging point to launch a ransomware attack. Frankfurt is the fourth German entity that shut down its IT network in the past two weeks because of Emotet.

Canadian Insurance Firm Hit By Maze Ransomware, Denies Data Theft According to emails sent to BleepingComputer from the operators of the Maze Ransomware, Andrew Agencies was attacked on October 21st, 2019 when the attackers breached their network and encrypted 245 computers. Based on the encrypted sizes listed in this proof, the Maze Ransomware states they have encrypted a total of 63 terabytes of data.

Ransomware: The number of victims paying up is on the rise, and that’s bad news

Nexus Mods breached. Even though we were able to secure the endpoint as soon as we discovered the exploit, as a measure of security, we are informing all of you, as we cannot rule out that further access to other user data including email addresses, password hashes and password salts has taken place.. Also

– From dropbox(updater) to NT AUTHORITY\SYSTEM In this post Im going to show how to use the DropBoxUpdater service in order to get SYSTEM privileges starting from a simple Windows user.

Privilege Escalation Flaws Found in Preinstalled Acer, ASUS Software The first bug impacts Acer Quick Access, an application that allows users to toggle wireless devices on or off, to modify power-off USB charge settings and network sharing options, and more.. The second flaw impacts ASUS ATK Package and can be exploited during the post-compromise phase of an attack, to achieve persistence and evade detection.

OpenSSL 1.0.2u released.

DNSSEC still fueling DNS amplification attacks, TCP SYN flood attacks rise TCP SYN flood is not a new method, but findings indicate that techniques have grown in sophistication and have emerged as the third most used attack vector, behind DNS amplification and HTTP flood attacks.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.