Daily NCSC-FI news followup 2020-06-03

Critical SAP ASE Flaws Allow Complete Control of Databases

threatpost.com/critical-sap-ase-flaws-complete-control-databases/156239/ If exploited, the most severe flaws could give unprivileged users complete control of databases and in some cases even underlying operating systems – The most severe vulnerability, CVE-2020-6248, has a CVSS score of 9.1 out of 10. See also:

wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222. And also:


Vulnerability Spotlight: Two vulnerabilities in Zoom could lead to code execution

blog.talosintelligence.com/2020/06/vuln-spotlight-zoom-code-execution-june-2020.html An exploitable path traversal vulnerability exists in the Zoom Client version 4.6.10 processes messages including animated GIFs. In order to trigger this vulnerability, an attacker needs to send a specially crafted message to a target user or a group. See also:

talosintelligence.com/vulnerability_reports/TALOS-2020-1055. And also:


Large-scale attack tries to steal configuration files from WordPress sites

www.zdnet.com/article/large-scale-attack-tries-to-steal-configuration-files-from-wordpress-sites/ Hackers have launched a massive campaign against WordPress websites over the past weekend, attacking old vulnerabilities in unpatched plugins to download configuration files from WordPress sites. Campaign accounted for 75% of all attempted exploits of plugin and theme vulnerabilities across the WordPress ecosystem

Ransomware gang says it breached one of NASA’s IT contractors

www.zdnet.com/article/ransomware-gang-says-it-breached-one-of-nasas-it-contractors/ DopplePaymer ransomware gang claims to have breached DMI, a major US IT and cybersecurity provider, and one of NASA IT contractors. In a blog post published today, the DopplePaymer ransomware gang said it successfully breached the network of Digital Management Inc. (DMI), a Maryland-based company that provides managed IT and cyber-security services on demand.

European Cyber Security Challenge 2020 – Event Date Change

www.enisa.europa.eu/news/enisa-news/european-cyber-security-challenge-2020-dates-changed The ECSC Steering Committee together with the Austrian national planners and the support of the European Agency for Cybersecurity decided to change the dates of the European Cyber Security Challenge 2020 Finals, scheduled to take place in Vienna this November. More information: europeancybersecuritychallenge.eu/

Pidä varasi: Lidl-huijaus kerää suomalaisten yhteystietoja

www.is.fi/digitoday/tietoturva/art-2000006528702.html Facebookissa näytetään suomalaisille Lidlin nimissä tehtyä huijausta, jonka varjolla ihmisiltä kalastellaan yhteystietoja.

You might be interested in …

Daily NCSC-FI news followup 2019-11-21

The Cyber-Physical Security of the Power Grid smartgrid.ieee.org/newsletters/november-2019/the-cyber-physical-security-of-the-power-grid Since critical infrastructures play a crucial role in our everyday life, its security has to be considered as one of the most important challenges in this modern era.. Physical and cyber security of smart power grids is very difficult due to their complexity and inhomogeneity. A huge […]

Read More

Daily NCSC-FI news followup 2020-09-10

Viranomainen varoittaa huijausviestistä – varo tätä sähköpostia www.is.fi/digitoday/tietoturva/art-2000006630773.html Apple ID -tunnusten kalastelu on nyt aktiivista. Huijauksen mukaan vastaanottajan Apple ID:tä olisi käytetty luvattomasti muualla Applen iCloud-palveluun kirjautumiseksi. Tämän väitetään tapahtuneen Moskovasta käsin. Mukana on keinotekoinen ip-osoite sekä päivämäärä ja kellonaika. Ne saattavat vaihdella viestistä toiseen. Katso myös meidän twiitti: https://twitter.com/CERTFI/status/1303604786361774080 Ransomware accounted for 41% of […]

Read More

Daily NCSC-FI news followup 2021-03-31

CISA gives federal agencies 5 days to find hacked Exchange servers www.bleepingcomputer.com/news/security/cisa-gives-federal-agencies-5-days-to-find-hacked-exchange-servers/ See also: cyber.dhs.gov/ed/21-02/ North Korean hackers target security researchers again www.bleepingcomputer.com/news/security/google-north-korean-hackers-target-security-researchers-again/ Google’s Threat Analysis Group (TAG) says that North Korean government-sponsored hackers are once again targeting security researchers using fake Twitter and LinkedIn social media accounts. Risk Management, C-Suite Shifts & Next-Gen Text […]

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.