Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
SuperValu Food Stores Reports Network Intrusion
Oldest First  |  Newest First  |  Threaded View
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
8/15/2014 | 3:29:07 PM
betting on a breach
I would be shocked if there wasn't a breach of debit and credit-card data here. Not clear why they are being so cagey and cautious unless they were at risk of being outed about the intrusion, and wanted to get on top of the story. Either way, it's smart for SuperValu to start offering credit monitoring from the get-go.
progman2000
progman2000,
User Rank: Apprentice
8/15/2014 | 4:35:53 PM
Re: betting on a breach
Wow, glad I never stepped foot in a SuperValu.  I have not interest in having to change all of my auto bill pay accounts again because some crummy hacker somewhere may have gotten my Visa number (thank you Target)...
Bprince
Bprince,
User Rank: Ninja
8/15/2014 | 8:54:45 PM
another day...
another breach. Interesting that a month goes by between the incident and the notification. I wonder when they found out about it and how? 

BP
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
8/18/2014 | 9:24:07 AM
Re: another day...
We are continuing to report on this as SuperValu investigates what was exposed or stolen. Stay tuned for more coverage of this latest retail hack.
ShermanK906
ShermanK906,
User Rank: Apprentice
8/18/2014 | 2:25:48 PM
Re: another day...
My reaction was, "Wow, only a month had gone by before reporting it."  Most companies seem to wait several months, if they ever report a breach.  But that's a lot of people affected by that breach.
voltagesecurity
voltagesecurity,
User Rank: Apprentice
8/18/2014 | 3:12:09 PM
VP Mark Bower's solution to neutralise the risk of malware
As VP Product Management Mark Bower stated, "By now, every retailer is aware of the risks of malware in the POS, the impact, and the simple fact being compliant to PCI doesn't equate to mitigating advanced threats that no doubt again stole the gold in this case. The only way to neutralise the risk of malware in the point of sale (POS) systems is to avoid any sensitive data passing in and through the vulnerable POS or retail IT. Hundreds of thousands of merchants already do this today with proven approaches using the latest innovations in data-centric security and are able to brush off such attacks like water off a duck's back. These risks are totally avoidable – and at a fraction of the cost of the fallout from dealing with the consequences." – Voltage Security
mschelin917
mschelin917,
User Rank: Apprentice
8/19/2014 | 2:22:16 PM
Re: betting on a breach
Hello, This is my first time commenting. What do we expect. As an avid reader I see every industry being attacked and breached.  Target didn't start this as attacks have been going on for years.  Folks, my two cents are the following.  It's time to start over.  The internet, software, everything with Security baked in from the ground up. It's to easy to now and patches won't cut it.  I know it's a radical idea but somethings got to change to make it harder for the bad guys. I'm sure there is going to be some of you that will flame me but do you have a better idea?  

 

Mike
Kelly Jackson Higgins
Kelly Jackson Higgins,
User Rank: Strategist
8/19/2014 | 2:41:07 PM
Re: betting on a breach
@Mike, that would definitely be the ideal scenario, but obviously not realistic to do overnight. There are Internet security efforts under way, of course, as well as secure software development initiatives. But it will always be a battle between good and evil. 

That's not to say everyone can't raise the bar more, though. It is frustrating to see the same old, same old, breaches again and again.


Edge-DRsplash-10-edge-articles
I Smell a RAT! New Cybersecurity Threats for the Crypto Industry
David Trepp, Partner, IT Assurance with accounting and advisory firm BPM LLP,  7/9/2021
News
Attacks on Kaseya Servers Led to Ransomware in Less Than 2 Hours
Robert Lemos, Contributing Writer,  7/7/2021
Commentary
It's in the Game (but It Shouldn't Be)
Tal Memran, Cybersecurity Expert, CYE,  7/9/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
Creating an Effective Incident Response Plan
Security teams are realizing their organizations will experience a cyber incident at some point. An effective incident response plan that takes into account their specific requirements and has been tested is critical. This issue of Tech Insights also includes: -a look at the newly signed cyber-incident law, -how organizations can apply behavioral psychology to incident response, -and an overview of the Open Cybersecurity Schema Framework.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2022-40204
PUBLISHED: 2022-12-01
A cross-site scripting (XSS) vulnerability exists in all current versions of Digital Alert Systems DASDEC software via the Host Header in undisclosed pages after login.
CVE-2022-46162
PUBLISHED: 2022-11-30
discourse-bbcode is the official BBCode plugin for Discourse. Prior to commit 91478f5, CSS injection can occur when rendering content generated with the discourse-bccode plugin. This vulnerability only affects sites which have the discourse-bbcode plugin installed and enabled. This issue is patched ...
CVE-2019-18265
PUBLISHED: 2022-11-30
Digital Alert Systems’ DASDEC software prior to version 4.1 contains a cross-site scripting (XSS) vulnerability that allows remote attackers to inject arbitrary web script or HTML via the SSH username, username field of the login page, or via the HTTP host header. The injected con...
CVE-2022-46156
PUBLISHED: 2022-11-30
The Synthetic Monitoring Agent for Grafana's Synthetic Monitoring application provides probe functionality and executes network checks for monitoring remote targets. Users running the Synthetic Monitoring agent prior to version 0.12.0 in their local network are impacted. The authentication token use...
CVE-2022-23746
PUBLISHED: 2022-11-30
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.