Whalers Blog

  • Blog
  • About
  • Admin
  • Categories
  • Contact
    • X
    • Telegram
    • Mastodon
    • Bluesky
  • February 6, 2025

    AutomationDirect C-more EA9 HMI

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: AutomationDirect Equipment: C-more EA9 HMI Vulnerability: Buffer Copy without Checking Size of Input (‘Classic Buffer Overflow’) 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to cause a denial-of-service condition or achieve remote code execution on the affected…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric Modicon M340 and BMXNOE0100/0110, BMXNOR0200H

    View CSAF 1. EXECUTIVE SUMMARY CVSS v3 8.6 ATTENTION: Exploitable remotely/low attack complexity Vendor: Schneider Electric Equipment: Modicon M340 and BMXNOE0100/0110, BMXNOR0200H Vulnerability: Exposure of Sensitive Information to an Unauthorized Actor 2. RISK EVALUATION Successful exploitation of this vulnerability could cause information disclosure of a restricted web page, modification of a web page, and a…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Schneider Electric Web Designer for Modicon

    View CSAF 1. EXECUTIVE SUMMARY CVSS v3 7.8 ATTENTION: Low attack complexity Vendor: Schneider Electric Equipment: Web Designer for Modicon Vulnerability: Improper Restriction of XML External Entity Reference 2. RISK EVALUATION Successful exploitation of this vulnerability could result in information disclosure, workstation integrity and potential remote code execution on the compromised computer. 3. TECHNICAL DETAILS…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Elber Communications Equipment

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity/public exploits are available Vendor: Elber Equipment: Communications Equipment Vulnerabilities: Authentication Bypass Using an Alternate Path or Channel, Hidden Functionality 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker unauthorized administrative access to the affected device. 3. TECHNICAL DETAILS 3.1…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Rockwell Automation FactoryTalk AssetCentre

    View CSAF 1. EXECUTIVE SUMMARY CVSS v4 9.3 ATTENTION: Exploitable remotely/low attack complexity Vendor: Rockwell Automation Equipment: FactoryTalk AssetCentre Vulnerabilities: Inadequate Encryption Strength, Insufficiently Protected Credentials 2. RISK EVALUATION Successful exploitation of these vulnerabilities could allow an attacker to extract passwords, access, credentials, or impersonate other users. 3. TECHNICAL DETAILS 3.1 AFFECTED PRODUCTS The following…

    CISA, Cybersecurity, Security
  • February 6, 2025

    Lazarus Group Targets Organizations with Sophisticated LinkedIn Recruiting Scam

    Bitdefender Labs warns of an active campaign by the North Korea-linked Lazarus Group, targeting organizations by capturing credentials and delivering malware through fake LinkedIn job offers. LinkedIn may be a vital tool for job seekers and professionals, but it has also become a playground for cybercriminals exploiting its credibility. From fake job offers and elaborate…

    Cybersecurity, General, Security, Virus
  • February 6, 2025

    Infosec Global & Cryptomathic Partner for Cryptographic Asset Security

    The new partnership aims to create a seamless process for companies to discover, inventory, and manage cryptographic assets. The new partnership aims to create a seamless process for companies to discover, inventory, and manage cryptographic assets. Go to Source

    Compliance, Cryptography, PQC, Quantum Cryptography, Security, Security of Cryptographic Systems
  • February 6, 2025

    New Outlook’s security issues: Businesses should avoid switching!

    Microsoft’s “new Outlook” (introduced in 2022) has been promoted as an upgrade, but its implementation introduces severe data protection concerns – so severe that it’s fair to say it’s a downgrade rather than an upgrade. Regardless, Microsoft increasingly pushes personal and business Outlook users to switch to the new Outlook. But IT admins should be…

    Cryptography, Cryptography library, Cybersecurity, Cybersecurity awareness, Encryption, Security
  • February 6, 2025

    Free secure desktop email client for Linux, Windows and macOS

    The Tuta desktop email client for Linux, Windows, and macOS is an amazing tools that offers many benefits compared to accessing Tuta Mail and Tuta Calendar via web browser. Check here how our end-to-end encrypted, open source desktop clients for Linux, Windows and macOS make your experience with Tuta even more secure, and how the…

    Cryptography, Cryptography library, Cybersecurity, Cybersecurity awareness, Encryption, Security
  • February 6, 2025

    AIs and Robots Should Sound Robotic

    Most people know that robots no longer sound like tinny trash cans. They sound like Siri, Alexa, and Gemini. They sound like the voices in labyrinthine customer support phone trees. And even those robot voices are being made obsolete by new AI-generated voices that can mimic every vocal nuance and tic of human speech, down…

    AI, Cybersecurity, Cybersecurity awareness, Security, Security Awareness, Uncategorized, Vulnerabilities
Previous Page
1 … 59 60 61 62 63 … 95
Next Page

Designed by Alireza Gharib