Open in app

Sign In

Write

Sign In

Eli Cyber Security
Eli Cyber Security

1.6K Followers

Home

About

Jun 10, 2022

Two critical command injection vulnerabilities in Fujitsu cloud storage system allow remote encryption or deletion of files

Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up files. According to the report, these flaws reside in the enterprise-grade Fujitsu Eternus CS800 V8.1 solution. These problems were found by researchers at NCC Group, who…

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 10, 2022

Two critical command injection vulnerabilities in Fujitsu cloud storage system allow remote encryption or deletion of files

Two bugs in the web interface of a cloud storage system would allow authenticated threat actors to read, write, and even destroy backed up files. According to the report, these flaws reside in the enterprise-grade Fujitsu Eternus CS800 V8.1 solution. These problems were found by researchers at NCC Group, who…

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 10, 2022

Bluetooth signals on smartphones allow tracking any user’s location by exploiting BLE

A group of researchers managed to show that signals emitted by electronic devices can be identified and tracked individually. Experts at the University of California say that only a proper tracking tool is required to carry out this follow-up. Although the attack sounds simple, the researchers note that a threat…

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 9, 2022

Ransomware attack targeting public schools in New Jersey forces cancellation of final exams

Administrators of the Tenafly Public Schools, Bergen County, New Jersey, that the cybersecurity issue detected Thursday morning is a ransomware infection that blocked access to some computers on its networks. …

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 9, 2022

Education and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and Australia were being spied on since 2013

Researchers at security firm SentinelLabs report the detection of a new Chinese-speaking hacking group identified as Aoqin Dragon and which has been active since 2013. According to experts, this group focuses on cyber espionage against the government, educational, and telecommunications companies in Australia, Hong Kong, Singapore, and Vietnam. The main…

Cybersecurity

2 min read

Education and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and…
Education and telecommunication organizations based in Singapore, Hong Kong, Vietnam, Cambodia, and…
Cybersecurity

2 min read


Jun 3, 2022

How to hide spoofed malicious domain when users hover above a link in a phishing email in Microsoft Outlook, Word or Excel document?

A recent report indicates that Microsoft Office applications could be exposed to homograph attacks based on internationalized domain names (IDNs). In a successful attack, a target user scrolling over a link in a email or Word or Excel document could be automatically redirected to a malicious domain. The report, by…

Cybersecurity

2 min read

How to hide spoofed malicious domain when users hover above a link in a phishing email in Microsoft…
How to hide spoofed malicious domain when users hover above a link in a phishing email in Microsoft…
Cybersecurity

2 min read


Jun 3, 2022

CVE-2022–26134: Zero-day remote code execution vulnerability affecting Confluence Server and Data Center

Information security specialists at Volexity have discovered a remote code execution (RCE) vulnerability that resides in the latest, fully patched versions of the Atlassian Confluence Server. Tracked as CVE-2022–26134, the flaw has already been notified to the company. The researchers described it as a zero-day flaw in Confluence Server and…

Cybersecurity

3 min read

CVE-2022–26134: Zero-day remote code execution vulnerability affecting Confluence Server and Data…
CVE-2022–26134: Zero-day remote code execution vulnerability affecting Confluence Server and Data…
Cybersecurity

3 min read


Jun 2, 2022

YourCyanide, a new and sophisticated ransomware variant that integrates documents into PasteBin, Discord, and Microsoft Office

Specialists at Trend Micro analyzed a set of CMD-based ransomware samples that appear to have advanced capabilities for stealing sensitive information, bypassing remote desktop connections, and a feature to spread through physical drives and emails alike. Identified as YourCyanide, this new ransomware integrates documents from PasteBin, Discord, and Microsoft Office…

Cybersecurity

2 min read

Cybersecurity

2 min read


Jun 2, 2022

Warning: New cyber criminal group Karakurt is extorting millions of companies around the world

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued a security alert about Karakurt, a cybercriminal group that extracts data from affected organizations and threatens to sell or leak it on the dark web if victims don’t pay a ransom. This malicious operation is characterized by not using malware…

Cybersecurity

2 min read

Warning: New cyber criminal group Karakurt is extorting millions of companies around the world
Warning: New cyber criminal group Karakurt is extorting millions of companies around the world
Cybersecurity

2 min read


May 27, 2022

Texas shooter sent death threats via Facebook Messenger before the incident; Meta AI systems couldn’t detect them

It is well known that has implemented sophisticated technology to monitor private messages sent through Facebook and Instagram to identify patterns of harmful content such as child pornography, harassment the or sale of narcotics. …

Cybersecurity

2 min read

Cybersecurity

2 min read

Eli Cyber Security

Eli Cyber Security

1.6K Followers

Knowledge belongs to the world

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech