Remove about report-a-vulnerability
article thumbnail

Crickets from Chirp Systems in Smart Lock Key Leak

Krebs on Security

The lock’s maker Chirp Systems remains unresponsive, even though it was first notified about the critical weakness in March 2021. Cybersecurity & Infrastructure Security Agency (CISA) warned about a remotely exploitable vulnerability with “low attack complexity” in Chirp Systems smart locks.

Software 270
article thumbnail

More than 16,000 Ivanti VPN gateways still vulnerable to RCE CVE-2024-21894

Security Affairs

Experts warn of roughly 16,500 Ivanti Connect Secure and Poly Secure gateways still vulnerable to a remote code execution (RCE) flaw. Shadowserver researchers reported that roughly 16,500 Ivanti Connect Secure and Poly Secure gateways are vulnerable to the recently reported RCE flaw CVE-2024-21894.

VPN 118
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Experian Privacy Vulnerability

Schneier on Security

Brian Krebs is reporting on a vulnerability in Experian’s website: Identity thieves have been exploiting a glaring security weakness in the website of Experian, one of the big three consumer credit reporting bureaus. All that was needed was the person’s name, address, birthday and Social Security number.

article thumbnail

A Basic Timeline of the Exchange Mass-Hack

Krebs on Security

When did Microsoft find out about attacks on previously unknown vulnerabilities in Exchange? ” So far the earliest known report came on Jan. ” DEVCOR is credited with reporting two of the four Exchange flaws that Microsoft patched on Mar. 6, and officially informed Microsoft about it on Feb. Reston, Va.-based

Hacking 357
article thumbnail

Threat actors breached two crucial systems of the US CISA

Security Affairs

The US Cybersecurity and Infrastructure Security Agency (CISA) agency was hacked in February, the Recorded Future News first reported. In response to the security breach, the agency had to shut down two crucial systems, as reported by a CISA spokesperson and US officials with knowledge of the incident, according to CNN.

Hacking 139
article thumbnail

Does Your Organization Have a Security.txt File?

Krebs on Security

It happens all the time: Organizations get hacked because there isn’t an obvious way for security researchers to let them know about security vulnerabilities or data leaks. An example of a security.txt file. Image: Securitytxt.org. well-known/security.txt.

Retail 298
article thumbnail

Java services hit hardest by third-party vulnerabilities, report says

InfoWorld on Security

Java services are the most-impacted by third-party vulnerabilities, according to the “State of DevSecOps 2024” report just released by cloud security provider Datadog. Datadog’s report analyzed tens of thousands of applications and container images and thousands of cloud environments to assess application security.

74