New Apache PHP XSS Bug Displays Modified HTTP Request Text to Users
A researcher has discovered a cross-site scripting vulnerability caused by mishandling of a PHP header in Apache version 2.x. Upgrade PHP and review privileges for applications and services using...
View ArticleTenable Research Advisory: Peekaboo Critical Vulnerability in NUUO Network...
Tenable Research has discovered a critical vulnerability named Peekaboo permitting remote code execution in IoT network video recorders for video surveillance systems that would allow attackers to...
View ArticlePeekaboo: Don’t Be Surprised by These Not So Candid Cameras
Tenable Research discovered a major software flaw, dubbed Peekaboo, which gives cyber criminals control of certain video surveillance cameras, allowing them to secretly monitor, tamper with and even...
View ArticleNessus at 20: Why It’s More Than a Product to Me
In honor of the 20th anniversary of Nessus this year, we've been asking users around the world to answer the question, "I love Nessus because...." Here, Tenable's VP and Deputy CTO Glen Pendley does...
View ArticleXbash Malware Targets Windows and Linux with Ransomware and Cryptomining
Newly identified Xbash malware is targeting weak passwords and unpatched vulnerabilities on Linux and Windows systems to launch ransomware or cryptomining attacks.BackgroundUnit 42, Palo Alto Network’s...
View ArticleTenable Research Advisory: Rockwell Automation RSLinx Classic Lite RCE and...
Tenable Research has discovered multiple memory corruption issues in Rockwell Automation RSLinx Classic Lite 4.00.01 that may allow for remote code execution or denial of service. Customers are...
View ArticleFour Cybersecurity Questions Every CISO Should Be Ready to Answer
In part one of our six-part blog series on improving your cybersecurity strategy, we discuss how the industry’s reliance on a hyper-compartmentalized approach is making everyone less secure, and we...
View ArticleTenable Research Advisory: Popular TP-Link Router is Vulnerable to Remote...
Tenable Research has discovered multiple vulnerabilities in the TP-Link TL-WRN841N, a popular consumer router, one of which could be used by an attacker to remotely take over the device.What do you...
View ArticleTenable Research Advisory: Multiple Vulnerabilities Discovered in MikroTik's...
Tenable Research has discovered several vulnerabilities in RouterOS, an operating system used in MikroTik routers, the most critical of which would allow attackers to potentially gain full system...
View ArticleMikroTik RouterOS Vulnerabilities: There’s More to CVE-2018-14847
In the course of preparing his Derbycon 8.0 presentation on RouterOS vulnerabilities, Tenable Researcher Jacob Baines discovered more to CVE-2018-14847 than originally known. Here’s how it could allow...
View ArticleTenable Research Advisory: Multiple HPE iMC Vulnerabilities Could Lead to...
Tenable Research discovered multiple vulnerabilities in the HPE Intelligent Management Center. HPE is currently working to fix the issues and plans to release patches on Nov. 30.What you need to know:...
View ArticlePublic Exploit Modules Available for Cisco Prime Infrastructure Vulnerability
Users of Cisco Prime Infrastructure Software are urged to update to the latest version to address one of two vulnerabilities that, when chained, could lead to remote code execution with system-level...
View ArticleMicrosoft’s October 2018 Security Update: There's More to the Story
A week after Microsoft addressed 49 vulnerabilities in its October 2018 Security Update, new developments have emerged that change the threat profile of some of them.BackgroundOn Tuesday, October 9,...
View ArticleProcess-Led Deployment: How to Maximize Your Cyber Technology Investments
Taking a process-led approach to your cyber technology deployments is critical to your organization’s ability to reduce risk. Too often, organizations focus on solution features and not on driving the...
View Articlelibssh Vulnerable to Authentication Bypass (CVE-2018-10933)
A newly announced vulnerability in libssh, a multiplatform library that supports the Secure Shell (SSH) protocol, allows attackers to bypass authentication and gain full control over vulnerable...
View ArticlejQuery File Upload Plugin Leaves Web Servers Vulnerable to Unauthenticated...
Akamai disclosed that the popular jQuery File Upload plugin has been vulnerable to an unauthenticated file upload flaw since November 2010.BackgroundAkamai’s Security Intelligence Response Team (SIRT)...
View ArticleMicrosoft Data Sharing Service Zero-Day Exploit Released on Twitter
Researcher discloses privilege escalation zero-day in Microsoft’s Data Sharing Service on Twitter and provides a proof-of-concept that could be used to deploy attacks in the wild.BackgroundOn October...
View ArticleTweetable Exploit for X.org Server Local Privilege Escalation...
A researcher has published a local privilege escalation exploit that fits in a single tweet for xorg-x11-server. Vendors are rolling out fixes and mitigation advice.BackgroundOn October 25, a tweetable...
View ArticleDemonBot Malware Targets Apache Hadoop Servers Using Available Exploit Code
New DemonBot malware uses Apache Hadoop exploit also used by XBash to launch exploitation attempts at a rate of one million a day to facilitate widespread DDoS.BackgroundResearchers at Radware recently...
View ArticleBold State Cyber Plays Require Bold Action from the Private Sector, Too
State CISOs face unique challenges in a highly competitive cybersecurity market. Here are three actions the private sector can take to help.At the NASCIO annual conference, held Oct. 21-24 in San...
View Article