ICS Advisory: HID Global Reader Configuration Cards

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.3 ATTENTION: Low attack complexity Vendor: HID Global Equipment: Reader Configuration Cards Vulnerability: Improper Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to read the credential and device administration keys from a configuration card. Those keys could be used to create malicious configuration

Continue ReadingICS Advisory: HID Global Reader Configuration Cards

ICS Advisory: HID Global Encoders

  • Post author:
  • Post category:

View CSAF 1. EXECUTIVE SUMMARY CVSS v3 5.9 ATTENTION: Exploitable locally Vendor: HID Global Equipment: iCLASS SE, OMNIKEY Vulnerability: Improper Authorization 2. RISK EVALUATION Successful exploitation of this vulnerability could allow an attacker to read data from reader configuration cards and credentials. Reader configuration cards contain credential and device administration keys which could be used

Continue ReadingICS Advisory: HID Global Encoders

CISA Adds One Known Exploited Vulnerability to Catalog

  • Post author:
  • Post category:

CISA has added one new vulnerability to its Known Exploited Vulnerabilities Catalog, based on evidence of active exploitation. CVE-2023-4762 Google Chromium V8 Type Confusion Vulnerability These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise. Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited

Continue ReadingCISA Adds One Known Exploited Vulnerability to Catalog

Requirements when posting investments recommendations on social media

  • Post author:
  • Post category:

The European Securities and Markets Authority (ESMA) and National Competent Authorities are raising awareness of requirements established by the Market Abuse Regulation (MAR) which apply when posting investment recommendations on social media. They are also warning about the risks of market manipulation in such publications. When posting on social media, transparency and accuracy are key

Continue ReadingRequirements when posting investments recommendations on social media

Online cross-checking: what you post can reveal your private life

  • Post author:
  • Post category:

Ce que vous publiez sur Internet, même sous pseudo, peut permettre de vous identifier et de révéler votre vie privée. Les méthodes de réidentification appelée Renseignement d’Origine Source Ouverte (ROSO ou OSINT) consistent à collecter et recouper des informations en ligne. À travers la description de leur fonctionnement, la CNIL sensibilise sur les risques et

Continue ReadingOnline cross-checking: what you post can reveal your private life