Skip to content

Gotham Security Daily Threat Alerts

by on July 6, 2015

July 2, Threatpost – (International) Cisco UCDM platform ships with default, static password. Cisco warned customers that its Unified Communications Domain Manager Platform software versions prior to 4.4.5 have a default, static password for an account with root privileges, possibly allowing an unauthenticated remote attacker to take full control of an affected system with root privileges. Source

July 2, Softpedia – (International) GhostShell hackers reveal 548 targets, links to dumps. Hackers associated with GhostShell released a list of 548 compromised targets including government, educational, and retail sector Web sites along with links to previews of extracted data in an effort to reportedly draw attention to poor cybersecurity practices. The data contained contact information, dates of birth, and hashed and plain text passwords. Source

July 2, Securityweek – (International) PCI Council updates Point-to-Point Encryption Standard. The Payment Card Industry Security Standards Council (PCI SSC) announced the release of Version 2.0 of its PCI Point-to-Point Encryption Solution Requirements and Testing Procedures, updating requirements for encryption products and giving merchants the option to manage their own encryption solutions for point-of-sale (PoS) locations, among other changes intended to enhance security and PCI SSC compliance. Source

July 1, Threatpost – (International) LifeLock patches XSS that could’ve led to phishing. LifeLock patched a cross-site scripting (XSS) vulnerability on its Web site that could have allowed an attacker to inject HyperText Markup Language (HTML) into the site’s uniform resource locator (URL) to create a fake login page to harvest usernames and passwords from customers. Source

July 1, Securityweek – (International) Flaw in 802.11n standard exposes wireless networks to attacks: researchers. Security researchers in Belgium discovered a vulnerability in the frame aggregation mechanism in the 802.11n wireless networking standard in which an attacker could use a Packet-in-Packet (PIP) technique to inject arbitrary frames into wireless networks, allowing access to internal services. Source

July 1, Help Net Security – (International) 4,900 new Android malware strains discovered every day. Security researchers from G DATA reported that they discovered 440,267 new Android malware strains in the first quarter of 2015, and that at least 50 percent of the malware currently being distributed includes banking trojans and SMS trojans for financial motivations, among other findings. Source

July 1, Softpedia – (International) Schneider Electric’s Wonderware products receive security patch. Schneider Electric released a patch addressing a high-severity security vulnerability in its InTouch, Application Server, Historian, and SuiteLink applications in the Wonderware System Platform in which an attacker could leverage dynamic link library (DLL) hijacking to run code on an affected machine. Source

July 1, Threatpost – (International) Patched Apple Quicktime vulnerability details disclosed. Security researchers from Cisco released details on a recently patched use-after-free vulnerability in Apple’s QuickTime media player in which an attacker could access and control data inside the internal data in a QuickTime file to remotely execute code on a targeted system. Source

July 2, Help Net Security– (Massachusetts) Harvard University suffers IT security breach. Harvard University announced July 1 that 8 of its schools and administrative organizations were affected by a data breach discovered June 19. Federal law enforcement is working with the school to conduct a forensic investigation. Source

From → Security

Comments are closed.

%d bloggers like this: