Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Vulnerabilities / Threats

9/23/2016
09:40 AM
50%
50%

Top Democrats Tell Putin To Halt Hacking Of US Political Parties

Russia trying to influence November presidential elections, say Senator Dianne Feinstein and Rep. Adam Schiff.

Key US lawmakers have blamed Russia for the recent hackings on US political entities and attempting to disrupt the November presidential polls, reports Reuters. In a strongly worded statement, Senator Dianne Feinstein and Representative Adam Schiff have together condemned the attacks asking Russian President Vladimir Putin to put a stop to it.

"Americans will not stand for any foreign government trying to influence our election. We hope all Americans will stand together and reject the Russian effort," the joint statement said.

The lawmakers say the cyberattacks were not possible without instructions from “very senior levels” of the Russian government. US government officials have acknowledged that Russia is behind the hackings but the government has not officially accused it.

Click here for full report.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2016 | 8:17:56 AM
Re: Proof?
"... government how they must act ..."

Also completely agree. They care less as US would not care what Russia think of US.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2016 | 8:14:52 AM
Russian government?
 

It does not have to be Russian government doing it, anybody in Russia would love to have influence on US elections.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2016 | 8:12:38 AM
Re: Proof?
"... ust what proof do they have? ..."

Good question. if Russian hackers had a chance to hack any system in UC hey would do it I would say.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2016 | 8:09:58 AM
Re: Thank goodness
"... dems told putin to stop ..."

I agree. We just need to secure our systems, they will use any options available to them.
Dr.T
50%
50%
Dr.T,
User Rank: Ninja
9/26/2016 | 8:06:59 AM
Why not secure?
 

It is not clear to me why we continue to discuss this and not having these systems secured in the first place. Political parties most likely hold information about public that should have been secured.
OgdenL936
50%
50%
OgdenL936,
User Rank: Apprentice
9/24/2016 | 4:04:08 AM
Proof?
Just what proof do they have?  Just because the MSM says it is so is not "proof"  Tella LIEoften enough and some will begin to believe it.  By the way, who are we to telol a sovreign government how they must act?
Kiarko
100%
0%
Kiarko,
User Rank: Strategist
9/23/2016 | 10:00:33 AM
Thank goodness
I think we can all sleep better now knowing top dems told putin to stop... i know from our long history with them, Putin always listens to what we say. Like when we told him to leave Ukraine alone lol
COVID-19: Latest Security News & Commentary
Dark Reading Staff 5/28/2020
Stay-at-Home Orders Coincide With Massive DNS Surge
Robert Lemos, Contributing Writer,  5/27/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Can you smell me now?
Current Issue
How Cybersecurity Incident Response Programs Work (and Why Some Don't)
This Tech Digest takes a look at the vital role cybersecurity incident response (IR) plays in managing cyber-risk within organizations. Download the Tech Digest today to find out how well-planned IR programs can detect intrusions, contain breaches, and help an organization restore normal operations.
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-11844
PUBLISHED: 2020-05-29
There is an Incorrect Authorization vulnerability in Micro Focus Service Management Automation (SMA) product affecting version 2018.05 to 2020.02. The vulnerability could be exploited to provide unauthorized access to the Container Deployment Foundation.
CVE-2020-6937
PUBLISHED: 2020-05-29
A Denial of Service vulnerability in MuleSoft Mule CE/EE 3.8.x, 3.9.x, and 4.x released before April 7, 2020, could allow remote attackers to submit data which can lead to resource exhaustion.
CVE-2020-7648
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.72.2 are vulnerable to Arbitrary File Read. It allows arbitrary file reads for users who have access to Snyk's internal network by appending the URL with a fragment identifier and a whitelisted path e.g. `#package.json`
CVE-2020-7650
PUBLISHED: 2020-05-29
All versions of snyk-broker after 4.72.0 including and before 4.73.1 are vulnerable to Arbitrary File Read. It allows arbitrary file reads to users with access to Snyk's internal network of any files ending in the following extensions: yaml, yml or json.
CVE-2020-7654
PUBLISHED: 2020-05-29
All versions of snyk-broker before 4.73.1 are vulnerable to Information Exposure. It logs private keys if logging level is set to DEBUG.