PoC exploit is available for SAP RECON vulnerability
The PoC exploit released to GitHub makes use of the CVE-2020-6287 and CVE-2020-6286 flaws.
The PoC exploit released to GitHub makes use of the CVE-2020-6287 and CVE-2020-6286 flaws.
Twitter said that the incident appeared to be "a coordinated social engineering attack."
The collection of files covers early years in WikiLeaks and contains a number of chat logs between Julian Assange and other associates.
The database containes user names, names, hashed passwords, email addresses, and general geographic location.
The vulnerability has been patched as part of July 2020 Patch Tuesday release, which also includes security updates for 122 vulnerabilities.
The new Mirai variant is the first botnet version that incorporates the exploit for CVE-2020-10173.
Over the weekend, an advertisement appeared on one of the dark web marketplaces offering for sale the details of 142,479,937 MGM hotel guests.
The flaw allows a remote, unauthenticated attacker create a new SAP user with the highest privileges, and thus fully compromise vulnerable SAP installations.
A short overview of last week's top stories in the world of cyber security.
Citrix downplayed the impact of the vulnerabilities and said they are less likely to be exploited compared to CVE-2019-19781.
Showing elements 3551 - 3560