FreeBuf Morning Post | Serious security vulnerabilities in WordPress plug-ins affect 320000 websites; Hackers sold 49 million user records of American data broker LimeLeads; Australia Bank P&N Bank data leakage, wordpress performance

1 year ago (2023-12-07) Chief Editor
7 minutes
two hundred and seventy-one
zero

Original title: FreeBuf Morning Post | Serious security vulnerabilities in WordPress plug-ins affect 320000 websites; Hackers sold 49 million user records of American data broker LimeLeads; Australian bank P&N Bank data leakage

[Global developments] 1. Data leakage and user balance exposure of Australia Bank P&N Bank

P&N Bank encountered a network attack during the server upgrade. Now they are notifying customers of a data disclosure event, including the user's personal identity information (PII) and sensitive account information. [Foreign magazine - read the original text]

2. Hackers sold 49 million user records of American data broker LimeLeads

The 49 million user records of LimeLeads were sold on a hacker forum. These data have been published on the Elastic search server, including the full name, job title, user email, employer/company name, company address, phone number, website URL, total revenue of the company and the estimated number of employees of the company. [Foreign magazine - read the original text]

3. Foreign media comment on Russia's attack on Burisma: the evidence is not completely reliable

The New York Times and network security company Area1 reported a new round of hacker attacks launched by Russian intelligence agencies against the Ukrainian natural gas company Burisma. Although the report paints a frightening picture, the evidence is not as conclusive as it seems. Although there is strong evidence that Burisma has successfully become the target of phishing activities, it is difficult to determine who is behind this activity. There are indeed indications that Russia's GRU intelligence agency may be involved, but the evidence is mostly indirect. [Read the original text]

4. Trump accused Apple of helping you so much that even a suspect's mobile phone wouldn't unlock it

Yesterday, US President Trump sent an article on Twitter to bombard Apple. Trump said that the US government helped Apple on trade and many other issues, but Apple refused to unlock the killer's mobile phone. [Read the original text]

5. Chuan Cook is setting up a senior advisory team to be responsible for the legal issues of decryption equipment with the US government

It is reported that Apple CEO Tim Cook is setting up an expert group to defend the company's encryption policy in view of the imminent legal confrontation with the US Department of Justice (DOJ). The New York Times quoted people familiar with the matter as saying that Cook has privately formed a senior advisory team, which will be responsible for considering Apple's legal options to publicly ease concerns about its unwillingness to crack the iPhone's built-in encryption technology. [Read the original text]

6. The US senator proposed a subsidy plan of more than 1 billion dollars to strengthen 5G construction to suppress Huawei

A bipartisan group of U.S. senators on Tuesday proposed legislation to help fund U.S. companies to develop safer 5G equipment. The bill will use the US wireless auction to fund a subsidy plan, which will be used to strengthen the research and development of 5G equipment. [Read the original text]

[Security Event] 1. Serious security vulnerabilities in WordPress plug-ins affect 320000 websites

Two WordPress plug-ins, InfiniteWP and WP Time Capsule, have serious security vulnerabilities, which are expected to affect 320000 websites. The firewall will not work and needs to be updated immediately. [Foreign magazine - read the original text]

2. "Microsoft Super Vulnerability"? Official Reply on CVE-2020-0601

In the January patch update list regularly released by Microsoft, a vulnerability has attracted great attention: a verification bypass vulnerability in CryptoAPI.dll elliptic curve cryptography (ECC) certificate CVE-2020-0601. Interestingly, after Microsoft's announcement, the US National Security Agency (NSA) also issued an early warning notice about CVE-2020-0601 vulnerability. According to the notice, NSA was the first to independently discover this vulnerability and report it to Microsoft (Microsoft thanked NSA in the report). [Read the original text]

3. Google hopes to gradually stop supporting third-party cookies for Chrome within two years

Google (GOOG) on Tuesday sounded the death knell for the most intrusive Internet tracker, saying that its Chrome browser would phase out cross site cookies that have supported digital advertising for 25 years. Following the recent ban of Apple, Microsoft and Mozilla, Google said that it would also disable so-called third-party cookies. These online trackers track Internet users across websites, sometimes tracking their browsing for several months in a row. [Read the original text]

4. Researchers have found 17 Google Play applications that use power consumption ads to bombard users

Researchers said that developers used various tricks to plant more than a dozen applications in Google Play and bombard users with advertisements. In order to hide, these applications will wait for 48 hours first, display ads 4 hours later, display ads at random intervals, and divide their code into multiple files. It is reported that Bitextender has found 17 such applications, with a total of 550000 installed. [Foreign magazine - read the original text]

5. The use of data of financial institutions whose apps were called by several banks needs to be standardized

Recently, the National Computer Virus Emergency Response Center found through Internet monitoring in the "Net 2020" special action that the apps of Minsheng Bank, Industrial Bank and other banks were listed in the harmful list because they "did not explicitly apply for all privacy rights to users, suspected of privacy non-compliance". [Read the original text]

6. Data shows that 1.08 billion fraud calls were intercepted nationwide in 2019

A few days ago, the Ministry of Industry and Information Technology announced the prevention and treatment of telecom network fraud in 2019. The data shows that in 2019, 10 800 million times, and 88. 8% of fraud numbers in key areas were closed 80000. The Ministry of Industry and Information Technology said that anti fraud should adhere to "technology based network", "number based network", "strict network management" and "collaborative network", clarify "two task lists" and focus on six tasks. [Read the original text]

[High quality article] 1. Preliminary analysis of Iranian hacker organizations

At present, many news websites are focusing on Iran's network security capabilities. Some institutions and security experts believe that the Iranian government may infiltrate network security and warn to improve the level of network security defense. This article mainly shares a study on some major threat organizations in Iran based on MITER ATT&CK and Malmedia. [Foreign magazine - read the original text]

2. The United States: the rising path of an information power

From the historical context of the development of American intelligence work, the transformation of war demand and foreign strategy has provided the basic impetus for the development of American intelligence work, and the innovation of the American intelligence community in the fields of information system, information technology, information theory and information culture has provided the basic guarantee for the development of intelligence work. [Read the original text]

3. Powershell practical thinking of penetration skills

I have heard that powershell is a powerful shell, like bash in Linux, and supports it NET, operating Windows services by command. It is now more widely used in penetration testing and other aspects. It can also avoid anti virus detection by executing commands without writing to disks. [Read the original text]

*The content of this article is collected from media and publications around the world. The producer is responsible for its integrity, but not for its authenticity and effectiveness.

*The content marked as [Foreign Journal] is mainly from media and publications in English speaking countries. Some content can only be read after registering a free account. Go back to Sohu to see more

Editor in charge:

This article is written by: Chief Editor Published on Software Development of Little Turkey , please indicate the source for reprinting: //hongchengtech.cn/blog/1993.html
Kuke_WP editor
author

Related recommendations

1 year ago (2024-02-20)

What are the main contents of wms system in warehouse management

Original title: What does the wms system mainly embody in warehouse management? What does the wms system mainly embody in warehouse management? Warehouse management has standardized and intelligent process oriented management. A good warehouse management mechanism can improve the efficiency of warehouse managers, relieve their pressure, and complete efficient and accurate work. 1. Warehouse management is accompanied by the progress of the times
1 year ago (2024-02-18)

How to implement the mptt comment function of CMS content management system in Django?, Django management page

During the daily development of content related Web systems in the directory, whether it is Blog or CMS, if you need to add links to interact with users, you must need the comment function. Next, you can implement the comment reply function in Django based on Python's MPTT framework. Note: Because the user comment function will involve a
three hundred and ninety-four
zero
1 year ago (2024-02-18)

Best CMS content management system in 2022, good novel in 2021

Looking for the best CMS software to build your website? At a high level, CMS or content management systems can help you create functional websites without having to use code to build every page from scratch. However, different CMS software has different advantages and disadvantages, so you need to choose the tool that best suits your specific needs and budget. To help, we accept
four hundred and six
zero
1 year ago (2024-02-18)

Shenzhen promotes the access of 5G base station energy storage system to the virtual power plant management center in the city. Does the Shenzhen 5g government subsidize the flow package charge

Xinhua News Agency, Shenzhen, December 14 (Reporter Wang Feng) At the 2022 Carbon Peak Carbon Neutralization Forum and Shenzhen International Low Carbon City Forum held here in Shenzhen, Shenzhen Virtual Power Plant Management Center signed a cooperation agreement on virtual power plant construction with China Tower, China Telecom, China Mobile, China Unicom, Huawei Digital Energy and other units on the 13th, which will jointly promote the city's 5G base station energy storage system
three hundred and forty-three
zero
1 year ago (2024-02-18)

Common website cms content management system recommendation, common website cms content management software

CMS is the abbreviation of "Content Management System", which means "Content Management System" in Chinese. These systems have developed common website functions and provided them to users for download, greatly improving the efficiency of website construction. The most common functions of CMS are column management, article management, product management, picture management
three hundred and twenty-eight
zero

comment

0 people have participated in the review

Scan code to add WeChat

contact us

WeChat: Kuzhuti
Online consultation: