article thumbnail

China-linked threat actors have breached telcos and network service providers

Security Affairs

“Upon gaining an initial foothold into a telecommunications organization or network service provider, PRC state-sponsored cyber actors have identified critical users and infrastructure including systems critical to maintaining the security of authentication, authorization, and accounting.

article thumbnail

Feds Warn About Critical Infrastructure Ransomware Attacks, Vulnerabilities

eSecurity Planet

Audit user accounts with administrative privileges and configure access controls with least privilege in mind, and use multifactor authentication. CVE-2017-10271 : An easily exploitable vulnerability in Oracle’s middleware allows an unauthenticated attacker to compromise and potentially take over the Oracle WebLogic Server.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Tricky Phish Angles for Persistence, Not Passwords

Krebs on Security

Second, this attack is not exactly new: In 2017, for instance, phishers used a similar technique to plunder accounts at Google’s Gmail service. Also, the resulting compromise is quite persistent and sidesteps two-factor authentication, and thus it seems likely we will see this approach exploited more frequently in the future.

Passwords 250
article thumbnail

Weekly Vulnerability Recap – Sept. 11, 2023 – Android Update Fixes 33 Vulnerabilities

eSecurity Planet

Alarmingly, this API lacks any form of authentication, allowing virtually anyone, even a malicious website you might visit, to send commands to the CLI. They can be remotely exploited without authentication, potentially enabling remote code execution, service disruptions, and arbitrary operations on the routers. via port 8076.

article thumbnail

GAO Report shed the lights on the failures behind the Equifax hack

Security Affairs

The Equifax hack occurred in May 2017 when attackers exploited the CVE-2017-5638 Apache Struts vulnerability in the Jakarta Multipart parser upload function. “In July 2017, Equifax system administrators discovered that attackers had gained. Equifax took 76 days to detect the massive 2017 data breach.

article thumbnail

On the Twitter Hack

Schneier on Security

Someone compromised the entire Twitter network, probably by stealing the log-in credentials of one of Twitter's system administrators. Class breaks are endemic to computerized systems, and they're not something that we as users can defend against with better personal security. For Twitter users, this attack was a double whammy.

article thumbnail

Group-IB uncovers PerSwaysion – sophisticated phishing campaign targeting executives worldwide

Security Affairs

The threat actors leverage perfectly orchestrated social engineering technique by “persuading” people holding significant corporate positions to open a non-malicious PDF email attachment coming from an authentic address in their contacts. The page resembles an authentic Microsoft Office 365 file sharing page.