Cyware Daily Threat Intelligence January 19, 2018

Top Vulnerabilities Reported in the Last 24 Hours
Chromecast and Google Home
Google is set to issue a security patch for Chromecast and Google Home to resolve the traffic flooding problem swamping home networks. The security patch includes a series of work-around updates from router manufacturers aimed at containing the problem.

Cisco
Cisco systems released 26 security updates to fix a series of vulnerabilities--that included high-impact denial of service (DoS) services. The issues also included a privilege escalation flaw on Cisco Email Security Appliance (ESA), and Content Security Management Appliance (SMA).

Schneider Electric
The company revealed that a security bug in its software was exploited in a watershed incident discovered last month. Though Schneider initially informed its users that no hack was recorded. At the point, even security researchers wrongly assumed that the hackers were merely probing the systems and caused the shutdown, unintentionally.

Top Breaches Reported in the Last 24 Hours
MailChimp Newsletter
A security violation in MailChimp Newsletters has been discovered that has been leaking valuable personal information of users. Leaked information included personal information along with what the person may be interested in reading online and a list of valid emails.

Questar Assessment
A data breach exposed personal information of students from various schools in New York. Compromised data included names, Student Identification numbers, school names, grade levels of around 52 students. A third-party testing vendor, Questar Assessment was blamed for the breach.



Tags


    • Share this blog:
    To enhance your experience on our website, we use cookies to help us understand how you interact with our website. By continuing navigating through Cyware’s website and its products, you are accepting the placement and use of cookies. You can also choose to disable your web browser’s ability to accept cookies and how they are set. For more information, please see our Privacy Policy.