Remove partners directory
article thumbnail

ConnectWise fixed critical flaws in ScreenConnect remote access tool

Security Affairs

ConnectWise warns of the following two critical vulnerabilities in its ScreenConnect remote desktop access product: CWE-288 Authentication bypass using an alternate path or channel (CVSS score 10) CWE-22 Improper limitation of a pathname to a restricted directory (“path traversal”) (CVSS score 8.4) The issues impact ScreenConnect 23.9.7

Access 114
article thumbnail

Critical flaw found in deprecated VMware EAP. Uninstall it immediately

Security Affairs

A threat actor could trick a domain user with EAP installed in its web browser into requesting and relaying service tickets for arbitrary Active Directory Service Principal Names (SPNs). The vulnerabilities were both reported by Ceri Coburn from Pen Test Partners. ” reads the advisory published by the virtualization giant.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Data leak at fintech giant Direct Trading Technologies

Security Affairs

Directory listing. The discovered directory included multiple database backups, each holding a significant amount of sensitive information about the company’s users and partners. Also, DTT offers white-label services for fintech solutions. Cybernews contacted the company with our findings. Account data.

Metadata 124
article thumbnail

REvil ransomware gang hacked gaming firm Gaming Partners International

Security Affairs

The REvil ransomware operators made the headlines again, this time the gang claims to have hacked the Gaming Partners International (GPI). Gaming Partners International (GPI) is a full-service supplier of gaming furniture and equipment for casinos worldwide. SecurityAffairs – hacking, Gaming Partners International (GPI)).

article thumbnail

Ransomware Gangs Don’t Need PR Help

Krebs on Security

But absent any additional information from the victim company or their partners who may be affected by the attack, these kinds of stories and blog posts look a great deal like ambulance chasing and sensationalism. Currently, more than a dozen ransomware crime gangs have erected their own blogs to publish sensitive data from victims.

article thumbnail

What’s Behind the Wolters Kluwer Tax Outage?

Krebs on Security

The message was that the same file directories containing new versions of CCH’s software were open and writable by any anonymous user, and that there were suspicious files in those directories indicating some user(s) abused that access. One of the many open and writable directories on CCH’s site before my report on Friday.

Cloud 210
article thumbnail

MITRE and CISA release Caldera for OT attack emulation

Security Affairs

As described in each individual plugin README, it is also possible to git clone a specific protocol plugin directly into the Caldera plugins directory, following the “Installation” guidance.” . “This repository contains all the Caldera for OT plugins as git submodules.