Vulnerability about HCL Domino: buffer overflow via iNotes

Vulnerability about HCL Domino: buffer overflow via iNotes

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. Synthesis of the vulnerability  An attacker can trigger a buffer overflow via iNotes of HCL Domino, in order to trigger a denial of service, and possibly to run code.Impacted products: Domino by HCL,…

Vulnerability MongoDB Server denial of service via UUID Explain

Vulnerability MongoDB Server denial of service via UUID Explain

The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them. Synthesis of the vulnerability  An attacker can trigger a fatal error via UUID Explain of MongoDB Server, in order to trigger a denial of service.Vulnerable software: MongoDB Server.Severity of this announce: 2/4.Creation date:…

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Over 40 Apps With More Than 100 Million Installs Found Leaking AWS Keys

Most mobile app users tend to blindly trust that the apps they download from app stores are safe and secure. But that isn’t always the case. To demonstrate the pitfalls and identify vulnerabilities on a large scale, cybersecurity and machine intelligence company CloudSEK recently provided a platform called BeVigil where individuals can search and check…

‘We spent 40 days in a cave without sunlight or watches’

‘We spent 40 days in a cave without sunlight or watches’

Fifteen people from various backgrounds have recently left a cave in south-west France after 40 days underground. The experiment was designed to see how the absence of clocks, daylight and external communications would affect the participants’ sense of time. Project director Christian Clot and Marina Lançon, one of the volunteers in the study, told BBC…

NSA Offers OT Security Guidance in Wake of SolarWinds Attack

NSA Offers OT Security Guidance in Wake of SolarWinds Attack

Agency Warns Attackers Could Use IT Exploits to Pivot to OT Systems Akshaya Asokan (asokan_akshaya) • May 1, 2021     The U.S. National Security Agency is offering operational technology security guidance for the Defense Department as well as third-party military contractors and others in the wake of the SolarWinds supply chain attack. See Also:…

Researchers Uncover Iranian State-Sponsored Ransomware Operation

Researchers Uncover Iranian State-Sponsored Ransomware Operation

Researchers Uncover Iranian State-Sponsored Ransomware Operation | IT Security News 3. May 2021 Iran has been linked to yet another state-sponsored ransomware operation through a contracting company based in the country, according to new analysis.“Iran’s Islamic Revolutionary Guard Corps (IRGC) was operating a state-sponsored ransomware campaign through an Iranian contracting company called ‘Emen Net Pasargard’…

Peter Dutton takes aim at China; says Australians are with Morrison government

Peter Dutton takes aim at China; says Australians are with Morrison government

“I think part of the public is frankly ahead of where the public debate is because there’s just so much information available online. People see the reported comments of the ambassador and the vice ambassador here, as well as the spokesman out of Beijing.” He said he wanted to have a “more frank discussion with…