Monthly Archives: July 2016
Palo Alto Offers $16,000 In Looming CTF Hack Off
Symantec Won't Fix Catastrophic Flaws Until Mid-July
‘Ruthless’ cybercriminals pose a major threat to organizations
Organizations need to better understand how “ruthless and efficient” cybercriminals are, according to a new report from BT and KPMG.
The post ‘Ruthless’ cybercriminals pose a major threat to organizations appeared first on We Live Security.
![]()
Bulgaria passes Law that mandates Government Software must be Open Source
Do you have any idea what the software you have installed is doing stealthily in the background? If it’s not an open source software, can you find out?
Usually, the answer is no.
After Edward Snowden’s revelations, it’s clear that how desperately government agencies wants to put secret backdoors in your network, devices, and software.
<!– adsense –>
However, Bulgaria has come forward with
![]()
Types of VPN networks and how they work: do you know which kind to use?
We Live Security delves deeper into VPN networks, asking how do they work? And what are the most common types of VPN that can be implemented?
The post Types of VPN networks and how they work: do you know which kind to use? appeared first on We Live Security.
![]()
Ransomware: First files … now complete devices
Over the past year, cases of ransomware have gained prominence in the field of computer security due to a notable growth in the number of victims. This is, in turn, due to the significant profits that cybercriminals can obtain from this type of malicious campaign.
The post Ransomware: First files … now complete devices appeared first on We Live Security.
![]()
APT Group ‘Patchwork’ Cuts-and-Pastes a Potent Attack
Researchers discover APT attackers that rummage dark web, GitHub and hidden criminal forums to patch together a high-impact APT.
Insecure Unserialize in extension "Page path" (pagepath)
Release Date: July 7, 2016
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.0.3 and below
Vulnerability Type: Insecure Unserialize
Severity: Medium
Suggested CVSS v2.0: AV:N/AC:M/Au:N/C:P/I:P/A:N/E:F/RL:O/RC:C (What’s that?)
Problem Description: The extension unserializes strings from untrusted source.
Solution: Versions of this extension that are known to be vulnerable will no longer be available for download from the TYPO3 Extension Repository. The extension is no longer maintained and the author will not provide a security fix for the reported vulnerability. Please uninstall and delete the extension from your installation.
Credits: Credits go to the security team member Helmut Hummel who discovered and reported the vulnerability.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
Cross-Site Scripting in extension "CCDebug" (cc_debug)
Release Date: July 7, 2016
Component Type: Third party extension. This extension is not a part of the TYPO3 default installation.
Affected Versions: version 1.0.0 and below
Vulnerability Type: Cross-Site Scripting
Severity: Low
Suggested CVSS v2.0: AV:N/AC:L/Au:N/C:N/I:P/A:N/E:F/RL:O/RC:C (What’s that?)
Problem Description: The extension fails to properly sanitize user input.
Solution: An updated version 1.0.1 is available from the TYPO3 Extension Manager and at https://typo3.org/extensions/repository/download/cc_debug/1.0.1/t3x/. Users of the extension are advised to update the extension as soon as possible.
Credits: Credits go to Sebastian Fischer who discovered and reported the vulnerability.
General advice: Follow the recommendations that are given in the TYPO3 Security Guide. Please subscribe to the typo3-announce mailing list to receive future Security Bulletins via E-mail.
