Latest Security News about attack

AI Firewall Defends From AI Attacks

WAFs were not designed to combat algorithmic attacks and the most effective way to defend from AI attacks - is with an AI firewall. Organizations are migrating to Kubernetes, but also exposing containerized applications to new security blind spots and attack surfaces that may compromise their entire IT systems. Prophaze levels the playing field for [...]

Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry key

  Overview : In Rockwell Automation RSLinx Classic versions 4.1.00 and prior, an authenticated local attacker could modify a registry key, which could lead to the execution of malicious code using system privileges when opening RSLinx Classic. ICS Advisory (ICSA-20-100-01) Rockwell Automation RSLinx Classic Legal Notice All information products included in https://us-cert.gov/ics are provided "as is" for informational [...]

PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers

Overview : PRTG Network Monitor before 20.1.57.1745 allows remote unauthenticated attackers to obtain information about probes running or the server itself (CPU usage, memory, Windows version, and internal statistics) via an HTTP request, as demonstrated by type=probes to login.htm or index.htm. CVE-2020-11547   References MISC:https://github.com/ch-rigu/PRTG-Network-Monitor-Information-Disclosure

unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension.

  Overview : An unrestricted file upload vulnerability in keywordsImport.php in TestLink 1.9.20 allows remote attackers to execute arbitrary code by uploading a file with an executable extension. This allows an authenticated attacker to upload a malicious file (containing PHP code to execute operating system commands) to a publicly accessible directory of the application. CVE-2020-8639 [...]