To read the article, click here. * Subscription is required to read the full article. A cyberattack into Marriott’s Starwood properties reservation database yielded personal information for up to 500 million customers. The hack began in 2014 and went undetected until September 2018. Managing Partner Vincent Liu is quoted about security issues within the …
News & Events
PhpSpreadsheet is a library written in pure PHP that provides a set of classes allowing users to read from and write to different spreadsheet file formats, such as Excel and LibreOffice Calc.
A Bishop Fox researcher recently identified a vulnerability in an open source application released by Silverpeas.
A Bishop Fox researcher recently identified a vulnerability in an open source application released by OpenMRS.
To go to the article, click here. For more than an hour yesterday, Google’s cloud platform and business customers were affected when a Border Gateway Protocol (BGP) attack routed web traffic through Chinese, Nigerian, and Russian ISPs. Threatpost’s article on this incident includes a reference and explanation of this type of attack from Security …
To go to the article, click here. Another BGP hijacking attack yesterday rerouted internet connections to Google, Google Cloud, its APIs, and websites through systems in Russia and China. The Register article references Security Associate Zach Julian’s blog post An Overview of BGP Hijacking explaining this type of attack.
YunoHost is an application that is used to manage applications hosted on a Linux server. Additionally, it allows the user to manage the entire Linux system, including installed services, firewall rules, and system updates. The application’s official website is yunohost.org. Version 2.7.2 was released on August 22, 2017, and version 2.7.14 was released on June 28, 2018. This security advisory discusses several vulnerabilities Bishop Fox researchers found in it.
The Eaton power management appliance is manufactured by Eaton Corporation Plc. This equipment uses a web interface to allow administrators to configure it. Bishop Fox researchers identified three vulnerabilities in the appliance, described in this advisory.