A file upload vulnerability exists in Getsimple CMS v3.3.10. The vulnerability allows authenticated users with low privileged accounts to upload files to the uploads directory. Malicious users can exploit this vulnerability to upload and run arbitrary code from the uploads directory.
Monthly Archives: November 2016
Companies don’t take proper care of the data they store in the cloud

That hard disks, pen drives and other physical storage devices are an attractive target for cyber-criminals wanting to steal confidential information from enterprises is something that company managers are well aware of. And, in fact, they try to educate their employees about the need to use those tools properly.
However, the now-popular digital cloud, used by businesses to store increasing amounts of sensitive information, must also be taken into consideration when designing a company’s cyber-security strategy. Moving to the cloud has powerful benefits – cost savings, easy access to files from anywhere, convenience, etc.- yet it also poses some risks that must be identified and controlled.
According to a recent study published by the prestigious Ponemon Institute, the majority of businesses have not or do not know if they inspect their cloud services for malware.
The majority of businesses have not inspected their cloud services for malware.
According to the study, while 49 percent of business applications are now stored in the cloud, fewer than half of them are known, officially sanctioned or approved by the IT Department.
While respondents understand the risk of data breaches, nearly a quarter could not determine if they had been breached, and nearly a third couldn’t determine what types of data were lost in the breach(es). Neither do they know how the breach(es) occurred.
This and similar studies seem to indicate that enterprises rely too much in the security measures adopted by cloud service providers themselves and that, all too often, companies leave the protection of their most valuable secrets and assets almost exclusively in the hands of third parties such as Amazon or Slack.
To resolve this situation, CISPE, a coalition of cloud service providers operating in Europe, has published the sector’s first code of conduct aimed at ensuring data security and confidentiality. Compliant cloud infrastructure providers will be able to identify themselves with a ‘Trust Mark’ that will provide additional security assurance for customers, especially corporate ones.
Nevertheless, despite the measures taken by these Internet giants to ensure the integrity of the information stored on their servers, companies and their employees cannot ignore their own responsibility to keep corporate data and documents secure. Just as they take good care of their hard drives and pen drives, they should also take care of the cloud to prevent their data from ending up in the wrong hands.
The post Companies don’t take proper care of the data they store in the cloud appeared first on Panda Security Mediacenter.
Preparing for the Holiday Shopping Season? Cybercriminals are Getting Ready as Well – Help Net Security
Preparing for the Holiday Shopping Season? Cybercriminals are Getting Ready as Well – Help Net Security
CrySis Ransomware Master Decryption Keys Released
UK Approves Extradition Of British Hacker To The US
Navy Denies It Pirated 558K Copies Of Software
Mirai Botnet Missing Link Revealed As DVR Player
WinaXe 7.7 FTP Client Remote Buffer Overflow
This Metasploit module exploits a buffer overflow in the WinaXe 7.7 FTP client. This issue is triggered when a client connects to the server and is expecting the Server Ready response.
Trend Micro Smart Protection Server Exec Remote Code Injection
This Metasploit module exploits a vulnerability found in TrendMicro Smart Protection Server where untrusted inputs are fed to ServWebExec system command, leading to command injection. Please note: authentication is required to exploit this vulnerability.
Red Hat Security Advisory 2016-2718-01
Red Hat Security Advisory 2016-2718-01 – Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 54.0.2840.100. Security Fix: Multiple flaws were found in the processing of malformed web content. A web page containing malicious content could cause Chromium to crash, execute arbitrary code, or disclose sensitive information when visited by the victim.