Category

Website Protection
massive data leak israeli voters compromised data risk and compliance brand protection policy enforcement website protection third party risk assessment vendor risk assessment

Massive data leak of Israeli voters’ private information exposed inadvertently

Massive data leak of 6.5 Million Israeli voters’ personal data was exposed on a leak which included names, gender, addresses, and identity card numbers as well as phone numbers and other private information.  Every electoral party list in Israel was given a database containing every Israeli’s personal information for use in their campaign providing that...
Continue Reading
first american financial compromised data data leak

First American Financial suffers data leak

First American Financial Corporation left as many as 885 million real estate documents dating as far back as 2003 exposed in a recent data leak. The company, one of the largest real estate title insurance firms in the US, has already fixed the vulnerability as of Friday afternoon after the security researcher notified it of...
Continue Reading
wordpress website joomla malcious scripts malware hacking hacker

New Malicious Script poses threat to WordPress and Joomla-based websites

Cyber-security researchers are warning owners of Joomla and WordPress websites of a malicious redirect script that is pushing visitors to malicious websites and expose them to various malwares. A renowned cyber-security researcher published a report outlining a rogue hypertext access (.htaccess) injector found on a client website. He reported that the impacted site was directing...
Continue Reading
fdlp defacement iran us wars cyber attack cyber crime iranian hackers hacker

Attack by Iranian hackers on US Government Domain raises concerns about cyber defense

  Aptly timed.   Two words that sum up this attack by Iranian hackers on US cyberspace, what with rising tensions between the United States and Iran. A couple of days ago, the website for the Federal Depository Library Program (FDLP) was defaced by hackers based in Iran, shortly after the killing of Qassem Suleimani...
Continue Reading
Malware and Adware Attacks Using WP Plugins

Malware and Adware Attacks Using WP Plugins

With each passing day, cases of WordPress infection that redirects visitors to suspicious pages is getting common.  Recently, a vulnerability was discovered in tag Div Themes and Ultimate Member Plugins. In this WordPress redirect hack visitors to your website are redirected to phishing or malicious pages.   In this hack, users, when redirected, are taken...
Continue Reading
Website Vulnerability

SC Capital Website Vulnerability Almost Leaked Entire Database

The city of Columbia site had a security flaw in its search tool, according to independent security researchers. The flaw lets anyone view passwords for the website’s database and email protocol servers, creating a massive potential for abuse, researchers said on Thursday.   The vulnerability made it possible for someone to pull sensitive data out...
Continue Reading
Magento PayPal

Hackers abuse Magento PayPal integration to test validity of stolen credit cards

Hacker groups and online fraudsters are mishandling a component of Magento online shops to test the validity of stolen debit and credit card numbers. The transactions are executed against Magento stores that support the PayPal Payflow Pro integration. The PayPal Payflow Pro integration is a payment option available on Magento shops that enables an online...
Continue Reading
Protecting your Website against Cyber Attacks

Protecting your Website against Cyber Attacks

For an individual or any business their website and its contents mean a lot to them. It can be considered a very important asset or property in this digital age. A person or a group of people devote their time, effort, and other valuable resources to make sure that these assets are protected and secure....
Continue Reading
IBM WebSphere is a software framework and middleware that hosts Java-based web applications. This means that it’s similar to Adobe’s Flash Player, in a way that it allows Java-based applications to run on a web browser. This also means that since it hosts Java-based content, any and all information on sessions involving such applications will be taken note of, until the next time that the Java application is accessed. This threat is performed through inserting Java-based code on an application being ran, and this code is enough to send copies of information that’s been input towards a different location. For example: you’re playing a Java-based game on your browser and made an in-game purchase. For these purchases to take effect, you will have to input your credit card information, as well as other personal information that they will keep on file. If the vulnerabilities on WebSphere have been exploited, a code has already been inserted towards the page wherein you input the said information, and sends copies of It to a location where the perpetrator has access to, hence, immediately putting your financial security at risk. This is a form of injected phishing that targets a specific platform, and millions have been victims of such an activity. The reported affected versions of WebSphere are as follows: IBM WebSphere Application Server 9.0 versions prior to 9.0.0.10, with an interim fix on version 9.0.0.9 that has since been attacked IBM WebSphere Application Server 8.5 versions prior to 8.5.5.15, with an interim fix on version 8.5.5.14 that has since been attacked IBM WebSphere Application Server 8.0 versions prior to 8.0.0.15 IBM WebSphere Application Server 7.0 versions prior to 7.0.0.45 The interim fixes have been attacked primarily due to government institutions making use of this platform. This issue is due to the unsafe handling of JAVA object de-serialization through the SOAP connector. An attacker can exploit this issue by sending a specially crafted object through the SOAP connector. Upon successful exploitation, the attacker can then have full privileges on the platform, which allows them to edit, create, delete and export data with no inhibitions. That’s a major threat. There are several preventive measures that we can apply to try and mitigate the damage this can cause: Upgrade to the latest version of IBM WebSphere Application Server Verify no unauthorised system modifications have occurred before applying any patches Apply the principle of Least Privilege to all systems and services Remind users not to visit websites or follow links that come from untrusted sources These are not absolute fixes, but these can help reduce the risk of being exposed to this vulnerability. Until IBM designs a vaccine for this threat, this would be our best course of action.

IBM WebSphere Application Vulnerability Remote Code Execution

IBM WebSphere is a software framework and middle ware that hosts Java-based web applications. This means that it’s similar to Adobe’s Flash Player, in a way that it allows Java-based applications to run on a web browser. This also means that since it hosts Java-based content, any and all information on sessions involving such applications...
Continue Reading
Trusted and Recommended Add-on by Firefox discovered to be a Spyware

Firefox add-on discovered to be Spyware

Mozilla has removed an add-on from the recommended browser add-on list in Firefox’s official blog after a security researcher discovered the software was secretly logging browser histories. The add-on is described as a service that offers extensive real-time protection. The Add-On was developed by a German firm named Creative Software Solutions, it has over 220,000...
Continue Reading
1 2