SolarWinds patches critical Serv-U vulnerability exploited in the wild

Posted by & filed under Security Alerts.

SolarWinds is urging customers to patch a Serv-U remote code execution vulnerability that was exploited in the wild by “a single threat actor” in attacks targeting a limited number of customers. The vulnerability (tracked as CVE-2021-35211) impacts Serv-U Managed File Transfer and Serv-U Secure FTP, and it enables remote threat actors to execute arbitrary code with privileges following successful exploitation.

Νέο περιστατικό απάτης τύπου PHONE SCAM έχει εντοπίσει η CYTA

Posted by & filed under Security Alerts.

Το Εθνικό CSIRT-CY μετά από πληροφόρηση από την CYTA, ενημερώνει το κοινό ότι από την Τρίτη, 8 Ιουνίου 2021, έχει εντοπίσει νέο περιστατικό τηλεπικοινωνιακής απάτης, όπου επιτήδειοι από το εξωτερικό διενεργούν κλήσεις με πλασματικούς αριθμούς προς ανυποψίαστους συνδρομητές, κυρίως της κινητής τηλεφωνίας. Οι παραπλανητικές κλήσεις εμφανίζεται να προέρχονται από αριθμούς με προθέματα όπως +43 (Αυστρία),… Read more »

Russian state hackers switch targets after US joint advisories

Posted by & filed under Security Alerts.

Russian Foreign Intelligence Service (SVR) operators have switched their attacks to target new vulnerabilities in reaction to US govt advisories published last month with info on SVR tactics, tools, techniques, and capabilities used in ongoing attacks. The warning comes after US and UK governments formally attributed the SolarWinds supply-chain attack and COVID-19 vaccine developer targeting to Russian… Read more »

Ransomware gangs have leaked stolen data of 2000 companies so far

Posted by & filed under Security News.

Since 2019, ransomware gangs have leaked the stolen data for 2,103 companies on dark web data leaks sites. When modern ransomware operations began in 2013, the attacker’s goal was to encrypt as many companies as possible and then demand a ransom payment for a decryptor. Since the beginning of 2020, ransomware operations began conducting a new tactic… Read more »

QNAP removes backdoor account in NAS backup, disaster recovery app

Posted by & filed under Security Alerts.

QNAP has addressed a critical vulnerability allowing attackers to log into QNAP NAS (network-attached storage) devices using hardcoded credentials. The hard-coded credentials vulnerability tracked as CVE-2021-28799 was found by Taiwan-based ZUSO ART in HBS 3 Hybrid Backup Sync, the company’s disaster recovery and data backup solution. The company says that the security bug is already fixed in the following HBS versions and advises customers to… Read more »