Posts

Showing posts from July, 2017

Ukraine finally battens down its leaky cyber hatches after attacks

Image
KIEV (Reuters) - When the chief of Microsoft Ukraine switched jobs to work for President Petro Poroshenko, he found that everyone in the office used the same login password. It wasn't the only symptom of lax IT security in a country suffering crippling cyber attacks. from Reuters: Technology News http://ift.tt/2ueHxmq

Seed funding slows in Silicon Valley

Image
SAN FRANCISCO, August 1 (Reuters) - The bloom is off seed funding, the business of providing money to brand-new startups, as investors take a more measured approach to financing emerging U.S. technology companies. from Reuters: Technology News http://ift.tt/2tTXTl2

Are You Prepared for the Next Attack?

A WAKE-UP CALL From WannaCry and Petya to the most recent attacks today, #LeakTheAnalyst and HBO—it is now apparent that anyone or any organization is a target for cyber criminals. Attacks continue to grow at an alarming rate – in volume, sophistication and impact. As of May 2017, Check Point products are detecting over 17 million attacks each week, more than half of these attacks include payloads which are unknown at the time of detection and cannot be detected by conventional signature-based technology. These attacks serve as a wake-up call, illustrating how fragile and vulnerable organizations have become in recent years. But falling victim to cyber attacks is a fate which can be avoided in most cases. The next attack can and should be prevented! PREVENTING THE NEXT ATTACK The impacts of the WannaCry, Petya and numerous other successful attacks were not inevitable. Indeed, with the correct measures, best practices and technologies in place, many organizations were able to avoid t

S&P 500 to exclude Snap after voting rights debate

Image
NEW YORK (Reuters) - The S&P 500 will start excluding companies that issue multiple classes of shares, managers of the index said on Monday, a move that effectively bars Snap Inc after its decision to offer stock with no voting rights. from Reuters: Technology News http://ift.tt/2wfZqD0

Bitcoin technology faces split, may create clone virtual currency

Image
NEW YORK (Reuters) - Bitcoin's underlying software code could be split on Tuesday to create a clone called "Bitcoin Cash," potentially providing a windfall for holders of the digital currency. from Reuters: Technology News http://ift.tt/2udOXWZ

Pandora Media's revenue beats on advertising boost

Image
(Reuters) - Pandora Media Inc on Monday reported better-than-expected quarterly revenue as advertisers spent more on the online music streaming service amid stiff competition. from Reuters: Technology News http://ift.tt/2hi8rZk

Republicans want tech input on U.S. net neutrality legislation

Image
WASHINGTON (Reuters) - A U.S. congressional committee on Monday asked for input from Google parent Alphabet Inc , Facebook Inc , Comcast Corp , Amazon.com Inc and other major companies on a proposed rewrite of rules governing consumer internet access, according to an email reviewed by Reuters. from Reuters: Technology News http://ift.tt/2hiq9vI

ZDI-17-504: Trend Micro InterScan Messaging Security Proxy Command Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro InterScan Messaging Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2f2oKc1

ZDI-17-503: Trend Micro Deep Discovery Email Inspector kdump_setting Denial of Service Vulnerability

Image
This vulnerability allows remote attackers to delete arbitrary files on vulnerable installations of Trend Micro Deep Discovery Email Inspector. Authentication is not required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2hhjCBJ

ZDI-17-502: Trend Micro InterScan Messaging Security Proxy Command Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro InterScan Messaging Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2f1Oq8Z

ZDI-17-501: Trend Micro Control Manager BasePageSessionExpire External Entity Processing Information Disclosure Vulnerability

Image
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Authentication is required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tXBRSG

ZDI-17-500: Trend Micro Control Manager cmdHandlerFileHandling Directory Traversal Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Authentication is not required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tXCN9D

ZDI-17-499: Trend Micro Control Manager RestfulServiceUtility.NET SQL Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Authentication is required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tXUztd

ZDI-17-498: Trend Micro Control Manager RestfulServiceUtility.NET SQL Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Trend Micro Control Manager. Authentication is required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tY3w61

ZDI-17-497: Trend Micro Control Manager Debug Level Authentication Bypass Information Disclosure Vulnerability

Image
This vulnerability allows remote attackers to disclose sensitive information on vulnerable installations of Trend Micro Control Manager. Authentication is not required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tXDtMa

ZDI-17-496: Trend Micro Control Manager cmdHandlerNewReportScheduler SQL Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Trend Micro Control Manager. Authentication is not required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tX6cka

ZDI-17-495: Trend Micro Control Manager cmdHandlerStatusMonitor SQL Injection Remote Code Execution Vulnerability

Image
This vulnerability allows remote attackers to bypass authentication on vulnerable installations of Trend Micro Control Manager. Authentication is not required to exploit this vulnerability. from ZDI: Published Advisories http://ift.tt/2tXKWLd

Microsoft Windows SMB SMBLoris Denial of Service

A memory saturation vulnerability has been reported in Windows NetBIOS Session Service protocol. A remote authenticated or guest attacker could exploit this vulnerability by sending specially crafted requests to the target server. Successful exploitation of this vulnerability results in a denial of service condition. from Check Point Update Services Advisories http://ift.tt/2vYMVfw

Music streaming company Spotify has 60 million paying subscribers

Image
(Reuters) - Spotify now has 60 million paying subscribers, adding 10 million subscribers in less than five months, a spokeswoman for the music streaming company said on Monday. from Reuters: Technology News http://ift.tt/2wf0GWQ

SB17-212: Vulnerability Summary for the Week of July 24, 2017

Original release date: July 31, 2017 The US-CERT Cyber Security Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and Technology (NIST) National Vulnerability Database (NVD) in the past week. The NVD is sponsored by the Department of Homeland Security (DHS) National Cybersecurity and Communications Integration Center (NCCIC) / United States Computer Emergency Readiness Team (US-CERT). For modified or updated entries, please visit the NVD , which contains historical vulnerability information. The vulnerabilities are based on the CVE vulnerability naming standard and are organized according to severity, determined by the Common Vulnerability Scoring System (CVSS) standard. The division of high, medium, and low severities correspond to the following scores: High - Vulnerabilities will be labeled High severity if they have a CVSS base score of 7.0 - 10.0 Medium - Vulnerabilities will be labeled Medium severity