View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Rockwell Automation Equipment: AADvance Trusted SIS Workstation Vulnerabilities: Improper Input Validation 2. RISK EVALUATION Successful exploitation of these vulnerabilities could result in an
Continue ReadingBlog
AutomationDirect DirectLogic H2-DM1E
View CSAF 1. EXECUTIVE SUMMARY CVSS v4 8.7 ATTENTION: Exploitable from an adjacent network/low attack complexity Vendor: AutomationDirect Equipment: DirectLogic H2-DM1E Vulnerabilities: Session Fixation, Authentication Bypass by Capture-replay 2. RISK EVALUATION Successful exploitation of these vulnerabilities
Continue ReadingSiemens SIMATIC SCADA and PCS 7 Systems
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories
Continue ReadingSiemens Industrial Edge Management
As of January 10, 2023, CISA will no longer be updating ICS security advisories for Siemens product vulnerabilities beyond the initial advisory. For the most up-to-date information on vulnerabilities in this advisory, please see Siemens' ProductCERT Security Advisories
Continue ReadingMastercard Invests in Defense of Global Digital Economy With Acquisition of Recorded Future
Recorded Future is excited to announce that we are being acquired by one of the worlds most trusted and recognized companies, Mastercard, in a transaction valued at $2.65B. This marks an important milestone in our journey,
Continue ReadingProtecting Multi-Cloud Resources in the Era of Modern Cloud-Based Cyberattacks
Written by: Rupa Mukherjee, Jon Sabberton In the era of multi-cloud adoption, where organizations leverage diverse cloud platforms to optimize their operations, a new wave of security challenges have emerged. The expansion of attack surfaces beyond
Continue ReadingHygiene, Hygiene, Hygiene! [Guest Diary], (Wed, Sep 11th)
[This is a Guest Diary by Paul Olson, an ISC intern as part of the SANS.edu BACS program] Introduction Starting my internship with SANs Internet Storm Center [1] was daunting from the aspect of being unsure
Continue ReadingH1 2024: Malware and Vulnerability Trends Report
Summary:The "H1 2024 Malware and Vulnerability Trends Report" shares how threat actors refined their tactics and exploited zero-day vulnerabilities, leaving organizations increasingly vulnerable. Key trends include the rise of infostealer malware, which dominated the threat landscape,
Continue ReadingPython Libraries Used for Malicious Purposes, (Wed, Sep 11th)
Since I’m interested in malicious Python scripts, I found multiple samples that rely on existing libraries. The most-known repository is probably pypi.org[1] that reports, as of today, 567,478 projects! Malware developers are like regular developers: They
Continue ReadingISC Stormcast For Wednesday, September 11th, 2024 https://isc.sans.edu/podcastdetail/9134, (Wed, Sep 11th)
(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
Continue Reading