Sun.Oct 07, 2018

article thumbnail

The Git Project addresses a critical arbitrary code execution vulnerability in Git

Security Affairs

The Git Project released a new version of the Git client, Github Desktop, or Atom. that addressed a critical remote code execution vulnerability in the Git. The Git Project addressed a critical remote code execution vulnerability in the Git command line client, Git Desktop, and Atom. The flaw tracked as CVE-2018-17456 could be exploited by malicious repositories to remotely execute commands on a vulnerable system.

Security 102
article thumbnail

PoC Attack Escalates MikroTik Router Bug to ‘As Bad As It Gets’

Threatpost

Researchers say a medium severity bug should now be rated critical because of a new hack technique that allows for remote code execution on MikroTik edge and consumer routers.

IT 83
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

APT28 group return to covert intelligence gathering ops in Europe and South America.

Security Affairs

Experts from Symantec collected evidence that APT28 group returns to covert intelligence gathering operations in Europe and South America. APT28 state-sponsored group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) seems to have shifted the focus for its operations away from election interference to cyber espionage activities.

article thumbnail

NCSAM 2018 Week 2: A Rewarding Career in Cybersecurity

KnowBe4

Industry analysts predict that by 2020 there will be estimated to be 1.8 million unfilled jobs in cybersecurity. This presents a monumental risk to companies, worldwide, as they look to attract and retain these key professionals who keep their companies and general public safe from cybercriminals. And with the constant stream of breaking news reporting phishing and ransomware attacks, data leaks, and hacking, you can quickly see why there has never been a better time to be in the fast-growing fi

article thumbnail

Get Better Network Graphs & Save Analysts Time

Many organizations today are unlocking the power of their data by using graph databases to feed downstream analytics, enahance visualizations, and more. Yet, when different graph nodes represent the same entity, graphs get messy. Watch this essential video with Senzing CEO Jeff Jonas on how adding entity resolution to a graph database condenses network graphs to improve analytics and save your analysts time.

article thumbnail

D-Link fixed several flaws in Central WiFiManager access point management tool

Security Affairs

D-Link addresses several remote code execution and XSS vulnerabilities affecting the Central WiFiManager access point management tool. D-Link issued security patches to address several remote code execution and cross-site scripting (XSS) vulnerabilities affecting the Central WiFiManager access point management tool. The vulnerabilities have been reported by researchers at SecureAuth/CoreSecurity.

Access 85
article thumbnail

Security Affairs newsletter Round 183 – News of the week

Security Affairs

A new round of the weekly SecurityAffairs newsletter arrived! The best news of the week with Security Affairs. Let me inform you that my new book, “Digging in the Deep Web” is online with a special deal. 20% discount. Kindle Edition. Paper Copy. Once again thank you! · Estonia sues Gemalto for 152M euros over flaws in citizen ID cards issued by the company. · FBI IC3 warns of cyber attacks exploiting Remote Desktop Protocol (RDP). · Attackers chained three bugs to brea