Critical SAP Bug Allows Full Enterprise System Takeover

Critical SAP Bug Allows Full Enterprise System Takeover

Exploitation of the bug can allow an attacker to lift sensitive information, delete files, execute code, carry out sabotage and more. A critical vulnerability, carrying a severity score of 10 out of 10 on the CvSS bug-severity scale, has been disclosed for SAP customers. SAP’s widely deployed collection of enterprise resource planning (ERP) software is…

Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites

Credit-Card Skimmer Has Unlikely Target: Microsoft ASP.NET Sites

A campaign discovered by Malwarebytes Labs in mid-April has lifted credentials from a number of e-commerce portals. Researchers have identified a credit-card skimming campaign that’s been active since mid-April that has a rather specific and unusual target: ASP.NET-based websites running on Microsoft Internet Information Services (IIS) servers. New research from Malwarebytes Labs recently uncovered the…

AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals

AWS Facial Recognition Platform Misidentified Over 100 Politicians As Criminals

Comparitech’s Paul Bischoff found that Amazon’s facial recognition platform misidentified an alarming number of people, and was racially biased. Facial recognition technology is still misidentifying people at an alarming rate – even as it’s being used by police departments to make arrests. In fact, Paul Bischoff, consumer privacy expert with Comparitech, found that Amazon’s face recognition…

Helmholtz: Wie sicher ist das Reisen während der Corona-Pandemie?

Helmholtz: Wie sicher ist das Reisen während der Corona-Pandemie?

In dem bodengebundenen Forschungsflugzeug wird das Kabinenklima mit Messtechnik samt spezieller Dummies untersucht. Bild: DLR Zum Start der Sommerferien sind Reisen innerhalb Europas wieder möglich. Doch wie groß ist das Risiko, sich im Flugzeug oder Zug mit dem Coronavirus anzustecken? Forscher untersuchen, wie sich die Viren in der Kabine verteilen. Die Flugzeugkabine ist nur schwach…

Cybercriminals Use the Blockchain to Relay Secret Messages

Cybercriminals Use the Blockchain to Relay Secret Messages

SophosLabs published a study that revealed hackers use the blockchain network to share secret messages. A group of researchers from SophosLabs state that hackers operating the cryptojacking malware, Glupteba, have been using the Bitcoin blockchain network to communicate in secret. According to the report published on June 24, cybercriminals rely on a command and control…

Macromedia / Adobe Flash officially dies 31 December 2020 – after 25 years

Macromedia / Adobe Flash officially dies 31 December 2020 – after 25 years

The original 1995 ShockWave Global Download Servers at Macromedia HQ San Francisco Back in 1995 Macromedia’s influence on interactive media began with the launch of Shockwave, a technology that converted Macromedia Director presentations into a compressed format for web delivery: the first true animations on the Internet, which also allowed Youtube to exist later, delivering…

‘BlueLeaks’ Exposes Files from Hundreds of US Police Departments – searchable by Badge Number

‘BlueLeaks’ Exposes Files from Hundreds of US Police Departments – searchable by Badge Number

A partial screenshot of the BlueLeaks data cache. Hundreds of thousands of potentially sensitive files from US police departments across the United States were leaked online last week. The collection, dubbed “BlueLeaks” and made searchable online, stems from a security breach at Texas web design and hosting company Netsential that maintains a number of state…

Virtual Cyber Summit Power Hour DC Metro Edition

Virtual Cyber Summit Power Hour DC Metro Edition

Senior Level Executives are invited to participate in the Virtual Cyber Summit Power Hour DC Metro Edition. During these unprecedented times, it is more important than ever for business leaders to have a clear and well thought-out cyber security battle plan. Join us and learn from Leading Industry Experts from the US DHS, Arctic Wolf,…

Zoom: “The installer package is of bad quality.”

Zoom: “The installer package is of bad quality.”

Encountered this today: “The installation of a package which violates the quality standards isn’t allowed. This could cause serious problems on your computer. Please contact the person or organisation who provided this package file and include the details beneath.” #cybersecurity #notlinuxfriendly

Ebay: Why is This Website Port Scanning me?

Ebay: Why is This Website Port Scanning me?

Recently, I was tipped off about certain sites performing localhost port scans against visitors, presumably as part of a user fingerprinting and tracking or bot detection. This didn’t sit well with me, so I went about investigating the practice, and it seems many sites are port scanning visitors for dubious reasons. A Brief Port Scanning…

Gitlab: Jeder Fünfte tappte in die Falle – Firma startet Phishing-Angriff auf eigene Angestellte

Gitlab: Jeder Fünfte tappte in die Falle – Firma startet Phishing-Angriff auf eigene Angestellte

Phishing-Mails sind eine der beliebtesten Methoden, Zugang zu Firmenaccounts oder Privatkonten zu bekommen. Die Firma Gitlab wollte nun die eigene Sicherheit testen und war dabei erfolgreicher als erhofft. Es geht schneller, als viele Menschen sich eingestehen: Einmal einer falschen Mail vertraut und schon hat man Hackern oder Kriminellen die Türen zum eigenen E-Mail-Account, dem Rechner…

Scan your Linux security with Lynis

Scan your Linux security with Lynis

Image by : Internet Archive Book Images. Modified by Opensource.com. CC BY-SA 4.0 Check the security of your Linux box with this comprehensive open source security auditing tool. Have you ever thought about how secure your Linux machine really is? There are numerous Linux distros, each with its own default settings, on which you run…

‘The intelligence coup of the century’ – For decades, the CIA and German BND read the encrypted communications of allies and adversaries.

‘The intelligence coup of the century’ – For decades, the CIA and German BND read the encrypted communications of allies and adversaries.

An investigative report by The Washington Post and ZDF – published 11 FEB 2020. For more than half a century, governments all over the world trusted a single company to keep the communications of their spies, soldiers and diplomats secret. The company, Crypto AG, got its first break with a contract to build code-making machines…

Human Vs. Machine – Does Technology Require People at Battlefield?

Human Vs. Machine – Does Technology Require People at Battlefield?

This post is also available in: עברית (Hebrew) More sensors mean more data. Today’s battlefield is networked with sensors at an unprecedented scale. It is the Internet of Battlefield Things (IoBT) that encompasses drone payloads, video cameras, signal and radio sensors, cyber sensors and scores of other devices. This  cohesive network increases situational awareness, risk…