Lucene search

K

WordPress Bitcoin Payments – Blockonomics Security Vulnerabilities

impervablog
impervablog

Is the FSI innovation rush leaving your data and application security controls behind?

Fuelled by rising consumer expectations for innovative services and easy real-time access to financial products and information, financial services industries (FSI) and fintech organizations are racing to out-innovate each other and capture market share. The sizeable growth of investments into the....

0.2AI Score

2023-01-16 08:00 AM
4
malwarebytes
malwarebytes

Crypto-inspired Magecart skimmer surfaces via digital crime haven

This blog post was authored by Jerome Segura Online criminals rarely reinvent the wheel, especially when they don't have to. From ransomware to password stealers, there are a number of toolkits available for purchase on various underground markets that allow just about anyone to get a jumpstart....

0.1AI Score

2023-01-09 11:00 AM
19
ics
ics

#StopRansomware: Cuba Ransomware

Summary Actions to take today to mitigate cyber threats from ransomware: • Prioritize remediating known exploited vulnerabilities. • Train users to recognize and report phishing attempts. • Enable and enforce phishing-resistant multifactor authentication. Note: This joint Cybersecurity...

7.8CVSS

9.5AI Score

0.467EPSS

2023-01-05 12:00 PM
136
malwarebytes
malwarebytes

Fake Flipper Zero websites look to cause a big splash

Security researchers are advised to be on the lookout for scammers targeting their interest in the latest hard to obtain security testing tools. Flipper Zero, a slick looking portable multi-tool which frequently makes its way into the news, is one of the hottest pieces of kit around for security...

-0.2AI Score

2023-01-05 10:00 AM
99
schneier
schneier

Decarbonizing Cryptocurrencies through Taxation

Maintaining bitcoin and other cryptocurrencies causes about 0.3 percent of global CO2 emissions. That may not sound like a lot, but it's more than the emissions of Switzerland, Croatia, and Norway combined. As many cryptocurrencies crash and the FTX bankruptcy moves into the litigation stage,...

-0.5AI Score

2023-01-04 12:17 PM
8
thn
thn

The FBI's Perspective on Ransomware

Ransomware: contemporary threats, how to prevent them and how the FBI can help In April 2021, Dutch supermarkets faced a food shortage. The cause wasn't a drought or a sudden surge in the demand for avocados. Rather, the reason was a ransomware attack. In the past years, companies, universities,...

0.1AI Score

2023-01-04 10:24 AM
23
malwarebytes
malwarebytes

New device? Here's how to safely dispose of your old one

Until recently I had two old phones, one tablet and about 20 hard drives in storage that I was afraid to give up for recycling, or to pass on to someone that could use them. I wanted to dispose of them, but knowing how easy it is to retrieve data--such as personally identifiable information--even.....

-0.3AI Score

2023-01-03 01:00 AM
10
wpvulndb
wpvulndb

Blockonomics < 3.5.8 - Reflected Cross-Site Scripting

The plugin does not sanitise and escape the filter_by parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as...

6.1CVSS

5.9AI Score

0.001EPSS

2023-01-03 12:00 AM
8
openbugbounty
openbugbounty

bitcoin-black.com Cross Site Scripting vulnerability OBB-3125631

Following the coordinated and responsible vulnerability disclosure guidelines of the ISO 29147 standard, Open Bug Bounty has: a. verified the vulnerability and confirmed its existence; b. notified the website operator about its existence. Technical details of the vulnerability are currently...

-0.1AI Score

2023-01-01 07:08 PM
12
krebs
krebs

Happy 13th Birthday, KrebsOnSecurity!

KrebsOnSecurity turns 13 years old today. That's a crazy long time for an independent media outlet these days, but then again I'm bound to keep doing this as long as they keep letting me. Heck, I've been doing this so long I briefly forgot which birthday this was! Thanks to your readership and...

0.4AI Score

2022-12-29 10:35 PM
21
openvas

8.8CVSS

7.1AI Score

0.022EPSS

2022-12-28 12:00 AM
3
openvas

8.8CVSS

7.1AI Score

0.022EPSS

2022-12-28 12:00 AM
1
openvas

8.8CVSS

7.1AI Score

0.022EPSS

2022-12-28 12:00 AM
8
rapid7blog
rapid7blog

The 2022 Naughty and Nice List

It's the holiday season when children all over the world cross their fingers in the hope that they don't end up on a certain red-clad big man's naughty list. Turns out, we at Rapid7 have a similar tradition, only we're the ones making the list and there's a whole lotta naughty going on (not like...

-0.5AI Score

2022-12-27 06:42 PM
10
nuclei
nuclei

WordPress Paytm Payment Gateway <=2.7.0 - Server-Side Request Forgery

WordPress Paytm Payment Gateway plugin through 2.7.0 contains a server-side request forgery vulnerability. An attacker can cause a website to execute website requests to an arbitrary domain, thereby making it possible to obtain sensitive information, modify data, and/or execute unauthorized...

7.2CVSS

6.7AI Score

0.001EPSS

2022-12-22 10:17 AM
37
osv
osv

CVE-2022-41697

A user enumeration vulnerability exists in the login functionality of Ghost Foundation Ghost 5.9.4. A specially-crafted HTTP request can lead to a disclosure of sensitive information. An attacker can send a series of HTTP requests to trigger this...

5.3CVSS

5.2AI Score

0.002EPSS

2022-12-22 10:15 AM
3
mssecure
mssecure

Microsoft research uncovers new Zerobot capabilities

Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue to...

9.8CVSS

0.5AI Score

EPSS

2022-12-21 08:00 PM
41
mmpc
mmpc

Microsoft research uncovers new Zerobot capabilities

Botnet malware operations are a constantly evolving threat to devices and networks. Threat actors target Internet of Things (IoT) devices for recruitment into malicious operations as IoT devices’ configurations often leave them exposed, and the number of internet-connected devices continue to...

9.8CVSS

0.5AI Score

EPSS

2022-12-21 08:00 PM
40
wpexploit
wpexploit

Simple Membership < 4.2.2 - Contributor+ Stored XSS

The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as...

5.4CVSS

0.3AI Score

0.001EPSS

2022-12-21 12:00 AM
57
wpvulndb
wpvulndb

Simple Membership < 4.2.2 - Contributor+ Stored XSS

The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks which could be used against high privilege users such as admin. PoC 1. Exploit.....

5.4CVSS

1.4AI Score

0.001EPSS

2022-12-21 12:00 AM
6
krebs
krebs

The Equifax Breach Settlement Offer is Real, For Now

Millions of people likely just received an email or snail mail notice saying they're eligible to claim a class action payment in connection with the 2017 megabreach at consumer credit bureau Equifax. Given the high volume of reader inquiries about this, it seemed worth pointing out that while this....

-0.7AI Score

2022-12-20 08:08 PM
4
thn
thn

Beware: Cybercriminals Launch New BrasDex Android Trojan Targeting Brazilian Banking Users

The threat actors behind the Windows banking malware known as Casbaneiro has been attributed as behind a novel Android trojan called BrasDex that has been observed targeting Brazilian users as part of an ongoing multi-platform campaign. BrasDex features a "complex keylogging system designed to...

0.8AI Score

2022-12-20 02:33 PM
29
krebs
krebs

Hacked Ring Cams Used to Record Swatting Victims

Photo: BrandonKleinPhoto / Shutterstock.com Two U.S. men have been charged with hacking into the Ring home security cameras of a dozen random people and then "swatting" them -- falsely reporting a violent incident at the target's address to trick local police into responding with force....

0.5AI Score

2022-12-20 01:24 AM
26
thn
thn

Glupteba Botnet Continues to Thrive Despite Google's Attempts to Disrupt It

The operators of the Glupteba botnet resurfaced in June 2022 as part of a renewed and "upscaled" campaign, months after Google disrupted the malicious activity. The ongoing attack is suggestive of the malware's resilience in the face of takedowns, cybersecurity company Nozomi Networks said in a...

0.2AI Score

2022-12-19 01:09 PM
32
malwarebytes
malwarebytes

Chasing cryptocurrency through cyberspace, with Brian Carter: Lock and Code S03E26

On June 7, 2021, the US Department of Justice announced a breakthrough: Less than one month after the oil and gas pipeline company Colonial Pipeline had paid its ransomware attackers roughly $4.4 million in bitcoin in exchange for a decryption key that would help the company get its systems back...

-0.1AI Score

2022-12-19 09:00 AM
8
talosblog
talosblog

Threat Round up for December 9 to December 16

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Dec. 9 and Dec. 16. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,.....

-0.2AI Score

2022-12-16 07:29 PM
35
malwarebytes
malwarebytes

Play ransomware attacks city of Antwerp

The city of Antwerp's digital systems have come to a grinding halt. The Flemish government under which Antwerp resides has confirmed that this is the result of a ransomware attack. The consequences for the city's inhabitants are drastic, as hundreds of city employees revert to working on paper...

1AI Score

2022-12-14 12:30 PM
14
securelist
securelist

Reassessing cyberwarfare. Lessons learned in 2022

At this point, it has become cliché to say that nothing in 2022 turned out the way we expected. We left the COVID-19 crisis behind hoping for a long-awaited return to normality and were immediately plunged into the chaos and uncertainty of a twentieth-century-style military conflict that posed...

0.1AI Score

2022-12-14 10:00 AM
19
mskb
mskb

Update 17.17 for Microsoft Dynamics 365 Business Central 2020 Release Wave 2 (Application Build 17.17.49465, Platform Build 17.0.49353)

Update 17.17 for Microsoft Dynamics 365 Business Central 2020 Release Wave 2 (Application Build 17.17.49465, Platform Build 17.0.49353) Overview This update replaces previously released updates. You should always install the latest update. This update also fixes a remote code execution...

8.5CVSS

8.8AI Score

0.006EPSS

2022-12-13 08:00 AM
16
malwarebytes
malwarebytes

Electronic Sales Suppression Tools are cooking the books

When you see point of sale software in the news, it's usually because the terminal has been compromised and is now stealing payment details used in the device. Insecure stores, whether compromised as part of an inside job or a phishing attack, are a big problem for both buyers and the store itself....

-0.4AI Score

2022-12-13 05:00 AM
6
ibm
ibm

Security Bulletin: Apache Commons HttpClient 3.x (and few others) allow Man-In-The-Middle (MITM) attack

Summary Apache Commons HttpClient 3.x (and few others) used do not verify the server hostname in the subject Common Name (CN) and allows Man-In-The-Middle (MITM) attack Vulnerability Details ** CVEID: CVE-2012-5783 DESCRIPTION: **Apache Commons HttpClient, as used in Amazon Flexible Payments...

6.4AI Score

0.033EPSS

2022-12-12 01:16 PM
41
talosblog
talosblog

Threat Round up for December 2 to December 9

Today, Talos is publishing a glimpse into the most prevalent threats we've observed between Dec. 2 and Dec. 9. As with previous roundups, this post isn't meant to be an in-depth analysis. Instead, this post will summarize the threats we've observed by highlighting key behavioral characteristics,...

-0.1AI Score

2022-12-09 07:02 PM
19
code423n4
code423n4

saleReceiver and feeReceiver can steal refunds after sale has ended

Lines of code https://github.com/code-423n4/2022-12-escher/blob/main/src/minters/LPDA.sol#L81-L88 Vulnerability details First, lets go over how a buy happens. A buyer can buy NFTs at a higher price and then once the auction ends they can use refund() to return the over payments. The effect is that....

6.6AI Score

2022-12-09 12:00 AM
5
code423n4
code423n4

Funds reserved for refunding users can be steal in LPDA sale

Lines of code Vulnerability details Impact LPDA sale works like a Dutch Auction, where early buyers will get refund after the sale ended. In addition, in buy() function, when last NFT is saled, it is automatically ending the LPDA sale and send payments to sale receiver, fee to fee receiver. And...

7.1AI Score

2022-12-09 12:00 AM
9
code423n4
code423n4

Ownership of EscherERC721.sol contracts can be changed, thus creator roles become useless

Lines of code https://github.com/OpenZeppelin/openzeppelin-contracts-upgradeable/blob/65420cb9c943c32eb7e8c9da60183a413d90067a/contracts/access/AccessControlUpgradeable.sol#L150 https://github.com/code-423n4/2022-12-escher/blob/main/src/Escher721Factory.sol#L32 Vulnerability details Impact (...

6.9AI Score

2022-12-09 12:00 AM
2
osv
osv

Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code

Because of incorrect bounds on method Secp256k1::preallocated_gen_new it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator. The method takes a place for storing the context as a mutable reference and...

7.3AI Score

2022-12-08 04:00 PM
4
github
github

Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code

Because of incorrect bounds on method Secp256k1::preallocated_gen_new it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator. The method takes a place for storing the context as a mutable reference and...

0.3AI Score

2022-12-08 04:00 PM
15
malwarebytes
malwarebytes

Ho, ho, no! Scams to avoid this festive season

Whether you've been naughty or nice, someone will try and stuff a scam down your chimney either way. The FBI is warning of several likely ways to be parted from your funds or logins, and we're going to give some additional context along with tips to avoid these digital lumps of coal. Social media.....

-0.3AI Score

2022-12-07 11:45 AM
16
malwarebytes
malwarebytes

SIM swapper jailed for 18 months over crypto heist

Nicholas Truglia (25) from Florida was sentenced to 18 months on Thursday for his involvement in a digital heist that cost Michael Terpin (@michaelterpin), a renowned personality in the cryptocurrency space, $23.8M. The theft happened on January 2018, where Truglia and his co-conspirators targeted....

0.8AI Score

2022-12-06 01:00 PM
8
thn
thn

Darknet's Largest Mobile Malware Marketplace Threatens Users Worldwide

Cybersecurity researchers have shed light on a darknet marketplace called InTheBox that's designed to specifically cater to mobile malware operators. The actor behind the criminal storefront, believed to be available since at least January 2020, has been offering over 400 custom web injects...

0.2AI Score

2022-12-06 12:38 PM
34
krebs
krebs

Judge Orders U.S. Lawyer in Russian Botnet Case to Pay Google

In December 2021, Google filed a civil lawsuit against two Russian men thought to be responsible for operating Glupteba, one of the Internet's largest and oldest botnets. The defendants, who initially pursued a strategy of counter suing Google for interfering in their sprawling cybercrime...

-0.6AI Score

2022-12-05 07:44 PM
12
thn
thn

Russian Courts Targeted by New CryWiper Data Wiper Malware Posing as Ransomware

A new data wiper malware called CryWiper has been found targeting Russian government agencies, including mayor's offices and courts. "Although it disguises itself as a ransomware and extorts money from the victim for 'decrypting' data, [it] does not actually encrypt, but purposefully destroys data....

1AI Score

2022-12-05 12:24 PM
14
thn
thn

What the CISA Reporting Rule Means for Your IT Security Protocol

The new Cyber Incident Reporting for Critical Infrastructure Act of 2022 (CIRCIA) requires CISA to create rules regarding cyber incident reporting by critical infrastructure organizations. The RFI and hearings precede a Notice of Proposed Rulemaking (NPRM) that CISA must publish sooner than 24...

-0.1AI Score

2022-12-02 10:35 AM
16
malwarebytes
malwarebytes

CISA and the FBI issue alert about Cuba ransomware

In the latest #StopRansomware effort of publicizing ransomware information for network defenders, the Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) have issued a joint Cybersecurity Advisory (CSA) on the ransomware known as "Cuba." Though...

1.8AI Score

2022-12-02 07:00 AM
12
thn
thn

Cuba Ransomware Extorted Over $60 Million in Ransom Fees from More than 100 Entities

The threat actors behind Cuba (aka COLDDRAW) ransomware have received more than $60 million in ransom payments and compromised over 100 entities across the world as of August 2022. In a new advisory shared by the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau...

10CVSS

1.1AI Score

0.467EPSS

2022-12-02 06:04 AM
41
thn
thn

Malware Authors 'Accidentally' Crash KmsdBot Cryptocurrency Mining Botnet

An ongoing analysis into an up-and-coming cryptocurrency mining botnet known as KmsdBot has led to it being accidentally taken down by the threat actors themselves. KmsdBot, as christened by the Akamai Security Intelligence Response Team (SIRT), came to light mid-November 2022 for its ability to...

-0.1AI Score

2022-12-01 09:48 AM
19
osv
osv

Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code

Because of incorrect bounds on method Secp256k1::preallocated_gen_new it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator. The method takes a place for storing the context as a mutable reference and...

0.2AI Score

2022-11-30 12:00 PM
10
rustsec
rustsec

Unsound API in `secp256k1` allows use-after-free and invalid deallocation from safe code

Because of incorrect bounds on method Secp256k1::preallocated_gen_new it was possible to cause use-after-free from safe consumer code. It was also possible to "free" memory not allocated by the appropriate allocator. The method takes a place for storing the context as a mutable reference and...

0.2AI Score

2022-11-30 12:00 PM
9
securelist
securelist

Privacy predictions 2023

Our last edition of privacy predictions focused on a few important trends where business and government interests intersect, with regulators becoming more active in a wide array of privacy issues. Indeed, we saw regulatory activity around the globe. In the US, for example, the FTC has requested...

-0.2AI Score

2022-11-28 08:00 AM
5
thn
thn

Elon Musk Confirms Twitter 2.0 will Bring End-to-End Encryption to Direct Messages

Twitter chief executive Elon Musk confirmed plans for end-to-end encryption (E2EE) for direct messages on the platform. The feature is part of Musk's vision for Twitter 2.0, which is expected to be what's called an "everything app." Other functionalities include longform tweets and payments,...

-0.6AI Score

2022-11-28 05:25 AM
28
Total number of security vulnerabilities6256