Remove 10
article thumbnail

10-year-old vulnerability in Avaya VoIP Phones finally fixed

Security Affairs

The vulnerability, tracked as CVE-2009-0692 , could be exploited by an attacker to crash the ISC DHCP client and execute arbitrary code with the permissions of the client. Avaya did not address the vulnerability issue in some of its VoIP devices by applying the necessary patches that were released after the discovery of the flaw in 2009.

IoT 82
article thumbnail

10KBLAZE exploits could affect 9 out of 10 SAP installs of more than 50k customers

Security Affairs

In 2005 the company released the security note 8218752 and in 2009 released the security note 14080813 containing instructions on how to properly configure the access list for Gateway. Onapsis estimate that 10KBLAZE exploits could affect 9 out of 10 SAP systems of more than 50,000 customers worldwide. Pierluigi Paganini.

Risk 76
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Exclusive – Analysis of the sample that hit the Kudankulam Nuclear Power Plant

Security Affairs

The matter was conveyed by CERT-In [India’s national computer emergency response team] when it was noticed by them on September 4, 2019.”. Technical Analysis. The analyzed file is a Windows PE seen in Virust Total on 2019-10-27 at 00:57:32. It looks like been compiled on 2019-07-29 13:36:26 for a 32 bit machine.

IT 45
article thumbnail

Top Cybersecurity Accounts to Follow on Twitter

eSecurity Planet

lazydocker : A simple terminal UI for both docker and docker-compose : [link] pic.twitter.com/HsK17rzg8m — Binni Shah (@binitamshah) July 1, 2019. Krebs wrote for The Washington Post between 1995 and 2009 before launching his current blog KrebsOnSecurity.com. — Jack Daniel (@jack_daniel) October 10, 2018.

article thumbnail

The Burden of Privacy In Discovery

Data Matters

Should privacy be considered a “burden” under the proportionality analysis required by Federal Rule of Civil Procedure Rule 26(b)? 3 As a result, an emerging consensus of courts and commentators has concluded that privacy interests may — and indeed, should — be considered as part of the proportionality analysis required under Rule 26(b)(1).

Privacy 97
article thumbnail

Developments in Health Privacy and Cybersecurity Policy and Regulation: OCR Issues Cybersecurity Warnings and New Health Data Legislation Is Introduced

Data Matters

For example, the number of breaches of unsecured electronic Personal Health Information (“ePHI”) reported to the OCR affecting 500 or more individuals due to hacking or IT incidents increased 45% from 2019 to 2020. R-LA) introduced the Health Data Use and Privacy Commission Act (“Act”) on February 10, 2022. 45 CFR 164.308(a)(5)(i).

article thumbnail

Experts attribute NukeSped RAT to North Korea-Linked hackers

Security Affairs

On August 2019, the experts at Intezer and McAfee have conducted a joint investigation focused the analysis on the code reuse, past investigations revealed that some APT groups share portions of code and command and control infrastructure for their malware. The samples were importing a small number of common DLLs and functions.