The Latest 26 Security breaches Worldwide – Week 20, 2019

The Latest 26 Security breaches Worldwide - Week 20, 2019

26 Security breaches Worldwide – Week 20, 2019

Be informed about the latest 26 Security breaches Worldwide, identified and reported publicly during Week 20, 2019. As these security-related breaches have a severe negative impact on any business, consider a security AUDIT to prevent any similar cases.




  • Researchers have found bugs in web server portals to Microsoft SharePoint that could allow remote code execution.

  • Researchers have also found bugs in the Anker Roav A1 Dashcam software that can allow code execution thanks to a variety of issues.
    • Some remain unpatched. The Roav A1 Dashcam by Anker is a dashboard camera that allows users to connect using the Roav app for Android and iOS so that the users can toggle settings and download videos from the dashcam, along with a host of other features. These vulnerabilities could be leveraged by an attacker to gain arbitrary code execution on affected devices. Vulnerability Spotlight: Multiple vulnerabilities in the Roav A1 Dashcam

  • The network of the Indiana Pacers basketball team was hit last fall and breached by a phishing attack.
    • The team issued this notification last week and it contained many unanswered questions, such as why did they wait so long, what data was divulged, and why did the breach continue for weeks after it was first discovered. NOTICE OF DATA INCIDENT





 


Protect your WordPress: BEFORE IT’S TOO LATE! You will also protect your customers, your reputation and your online business!

Discover trending and viral stories about Security breaches Worldwide. The remaining Security breaches made news headlines. All these happened just last week.


  • The South Carolina company Micfo used numerous shell companies and aliases to secure more than 700,000 IP addresses from the ARIN registrar.

  • Members of an international cybercriminal syndicate supposedly responsible for creating the GozNym malware have been arrested and charged with stealing $100 million from more than 41,000 victims.

  • Steganography, or hiding data inside images, is very well-known.
    • What is less known is using this method to hide malware executables. Researchers have found .Net-based code samples that are used to avoid detection as the first malware stage. This post shows how the image files are constructed, so that you can watch out for this attack vector. Pretty Pictures Sometimes Disguise Ugly Executables



  • A UK-based private parking lot manager is being used as the lure for a new phishing scam that copies its website and email notifications.




  • Passport and personal data for more than 2M Russians has been leaked online.

  • The mobile provider Boost Mobile has acknowledged a breach in March recently.
    • The notification is short on details, but the company sent automatic PIN resets to affected customers. Boost Mobile hacked



  • The Israeli spyware vendor NSO Group has been leveraging a buffer overflow vulnerability in WhatsApp that allows hackers remote code execution on users’ phones.
    • The victims don’t necessarily have to answer a call, which then disappears from call logs. Users should update their software immediately to prevent this. (The patch doesn’t explicitly state this bug as a reason to update.) Affected phones of several high-profile victims were cited in the report, including a human rights lawyer. WhatsApp vulnerability exploited to infect phones with Israeli spyware

  • Picreel and the open source Alpaca Forms project have both suffered a supply chain breach with infected code.

  • Researchers have found two major bugs in Cisco’s IOS router operating system.
    • One would allow a hacker to remotely obtain root access to the devices. Also another bug can defeat the Trust Anchor feature on hundreds of millions of Cisco units around the world. Cisco has announced a patch, although there is no evidence that the technique is being used. Cisco Secure Boot Hardware Tampering Vulnerability and Thrangrycat

 


 

Get Healthy, Stay Healthy: A healthier online business starts today and it begins with you!

Do you have any concerns with Security breaches? Leave your thoughts in the comments below!

Related Posts

Leave a comment

Do NOT follow this link or you will be banned from the site!