QNAP Rushes Patch for Code Execution Flaw in NAS Devices

QNAP rolls out patches for multiple vulnerabilities after proof-of-concept exploit published for a remote code execution vulnerability.
The post QNAP Rushes Patch for Code Execution Flaw in NAS Devices appeared first on SecurityWeek.
Continue reading QNAP Rushes Patch for Code Execution Flaw in NAS Devices

Alkira Raises $100 Million for Secure Network Infrastructure Platform

Network infrastructure as-a-service Alkira has raised $100 million in a Series C funding round led by Tiger Global Management.
The post Alkira Raises $100 Million for Secure Network Infrastructure Platform appeared first on SecurityWeek.
Continue reading Alkira Raises $100 Million for Secure Network Infrastructure Platform

Cinterion Modem Flaws Pose Risk to Millions of Devices in Industrial, Other Sectors

A critical vulnerability in the Cinterion cellular modems can be exploited for remote code execution via SMS messages.
The post Cinterion Modem Flaws Pose Risk to Millions of Devices in Industrial, Other Sectors appeared first on SecurityWeek.
Continue reading Cinterion Modem Flaws Pose Risk to Millions of Devices in Industrial, Other Sectors

Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data 

Cuttlefish malware platform roaming around enterprise SOHO routers capable of covertly harvesting public cloud authentication data from internet traffic.
The post Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data  appeared first on… Continue reading Cuttlefish Malware Targets Routers, Harvests Cloud Authentication Data 

Machine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle

Venafi introduced a 90-Day TLS Readiness solution to help enterprises prepare for Google’s proposed 90-day limit for the lifecycle of a digital certificate.
The post Machine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle appeared fir… Continue reading Machine Identity Firm Venafi Readies for the 90-day Certificate Lifecycle

Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

While China-linked Muddling Meerkat’s operations look like DNS DDoS attacks, it seems unlikely that denial of service is their goal, at least in the near term.
The post Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report appeared … Continue reading Chinese Hackers Have Been Probing DNS Networks Globally for Years: Report

Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Okta warned of a spike in credential stuffing attacks using anonymizing services such as Tor, DataImpulse, Luminati, and NSocks.
The post Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies appeared first on SecurityWeek.
Continue reading Okta Warns of Credential Stuffing Attacks Using Tor, Residential Proxies

Cisco Raises Alarm for ‘ArcaneDoor’ Zero-Days Hitting ASA Firewall Platforms

Cisco warns that nation state-backed hackers are exploiting at least two zero-day vulnerabilities in its ASA firewall platforms to plant malware on telecommunications and energy sector networks.
The post Cisco Raises Alarm for ‘ArcaneDoor’ Zero-Days Hi… Continue reading Cisco Raises Alarm for ‘ArcaneDoor’ Zero-Days Hitting ASA Firewall Platforms