Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
'Pay Up or Get WannaCry Hit' Extortion Email Spreading
Newest First  |  Oldest First  |  Threaded View
Joe Stanganelli
50%
50%
Joe Stanganelli,
User Rank: Ninja
6/25/2018 | 11:29:06 PM
Re: Yo, dawg, I herd u like blackmail
@RyanSepe: So would it be called "WannaWannaCry"?
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
6/25/2018 | 1:25:32 PM
Re: Yo, dawg, I herd u like blackmail
Ha, this made me chuckle... seems like Blackception if you ask me.
jenshadus
50%
50%
jenshadus,
User Rank: Strategist
6/25/2018 | 9:23:15 AM
Re: Yo, dawg, I herd u like blackmail
Loved your response.  Very well put.
Joe Stanganelli
100%
0%
Joe Stanganelli,
User Rank: Ninja
6/24/2018 | 10:52:08 PM
Yo, dawg, I herd u like blackmail
Wow. How meta. An extortion scheme threatening the victim with...an extortion scheme!

The next step is blackmailing people into paying up lest they be blackmailed with blackmail! And then blackmailing people threatening them with blackmail with blackmail with blackmail!

Where's Xzibit when you need him?


Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-27348
PUBLISHED: 2020-12-04
In some conditions, a snap package built by snapcraft includes the current directory in LD_LIBRARY_PATH, allowing a malicious snap to gain code execution within the context of another snap if both plug the home interface or similar. This issue affects snapcraft versions prior to 4.4.4, prior to 2.43...
CVE-2020-16123
PUBLISHED: 2020-12-04
An Ubuntu-specific patch in PulseAudio created a race condition where the snap policy module would fail to identify a client connection from a snap as coming from a snap if SCM_CREDENTIALS were missing, allowing the snap to connect to PulseAudio without proper confinement. This could be exploited by...
CVE-2018-21270
PUBLISHED: 2020-12-03
Versions less than 0.0.6 of the Node.js stringstream module are vulnerable to an out-of-bounds read because of allocation of uninitialized buffers when a number is passed in the input stream (when using Node.js 4.x).
CVE-2020-26248
PUBLISHED: 2020-12-03
In the PrestaShop module "productcomments" before version 4.2.1, an attacker can use a Blind SQL injection to retrieve data or stop the MySQL service. The problem is fixed in 4.2.1 of the module.
CVE-2020-29529
PUBLISHED: 2020-12-03
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.