Hitachi Energy MicroSCADA Pro/X SYS600
1. EXECUTIVE SUMMARY CVSS v3 8.8 ATTENTION: Exploitable remotely/low attack complexity Vendor: Hitachi Energy Equipment: MicroSCADA Pro/X SYS600 Vulnerabilities: Observable Discrepancy, HTTP Request Smuggling, Classic Buffer Overflow, Improper Certificate Validation, Improper Restriction of Operations within the Bounds of a Memory Buffer, Exposure of Sensitive Information to an Unauthorized Actor…
Russia asks Apple to remove Telegram Messenger from the App Store
Russia’s communications regulator Roskomnadzor has threatened Apple to face the consequences if the company does not remove secure messaging app Telegram from its App Store. Back in April, the Russian government banned Telegram in the country for the company’s refusal to hand over private encryption…
AT&T and Aira announce global agreement to unlock IoT for good
AT&T and Aira extend their agreement as Aira made AT&T its global data provider as it begins to take the service to Australia, Canada and the U.K. This comes at a meaningful time. Today marks the 7th Global Accessibility Awareness Day (GAAD). The purpose of GAAD is to get everyone…
Watch out. North Korea keeps getting better at hacking
WASHINGTON — In the latest indication that North Korea’s cyber operations are more sophisticated than commonly realized, computer security researchers have identified a group of government hackers and spies in the hermit kingdom who are capable of stealing documents from computers that aren’t connected to…
Sqreen wants to become the IFTTT of web app security
French startup Sqreen recently launched a Security Hub with dozens of plugins to put you in control of the security of your web app. In many ways, it feels like enabling tasks on popular automation service IFTTT. Sqreen participated in TechCrunch’s Startup Battlefield and Y…
Buckhacker : search engine to find servers that can be hacked
BuckHacker: A search tool that allows you to search leaky Amazon Web Services servers The lives of hackers has just been made a lot easier, thanks to a tool created by anonymous hackers that allows security researchers and cybercriminals to search for sensitive information stored…
IoT ramps up cyber security risk, says in-depth report
A new report finds that most organisations lack the right mix of strategy and execution to tackle rising threats to cybersecurity. And the Internet of Things (IoT) is a growing part of the problem. Chris Middleton presents some solutions. What keeps business people awake at…
Nintendo Switch has been hacked
HACKERS have managed to hack Nintendo’s latest video game console, thanks to a hard-coded flaw in the Nvidia Tegra X1 silicon inside. Read More
Tesla public cloud environment hacked, attackers accessed ‘non-public’ company data
Building a slide deck, pitch, or presentation? Here are the big takeaways: 73% of organizations allow the root user account to be used to perform activities, which goes against security best practices. — RedLock, 2018 Hackers broke into Tesla’s public cloud environment and gained access…
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program
Singapore Ministry of Defence Concludes Successful Ethical Hacking Program The Singapore Ministry of Defence (MINDEF) today announced the results of the first MINDEF Bug Bounty Challenge, which was facilitated by HackerOne, the leading hacker-powered security platform. The three-week program invited 300 ethical hackers to penetrate…
Stay connected