Mitigate Baron SameEdit (CVE-2021-3156) vulnerability

Polyverse Weekly Breach Report

Nov 5, 2018By Shaina Raskin

A snapshot of last week’s reported breaches and vulnerabilities

Tomorrowland festival
Hackers accessed the data of 64,000 Tomorrowland music-festival attendees who attended the event in 2014. The information accessed included names, addresses, age, postcodes and genders. To read more:

Radisson Hotel Group
The Radisson Hotel Group fell victim to a data breach impacting members of the company’s loyalty and rewards program. The compromised information included names, physical addresses, countries of residence, email addresses and more. To read more:

A zero-day vulnerability has hit products running Cisco’s Adaptive Security Appliance and Firepower Threat Defense software. The vulnerability has been exploited in the wild and no patches are yet available. To read more:

Arik Air
An exposed Amazon S3 bucket caused a leak of customer data belonging to Nigerian airline Arik Air. The bucket was discovered on September 6th, and the files contained more than 80,000 rows of data. To read more:

Girl Scouts of the USA
The Orange County, CA branch of the Girl Scouts was hacked, and personal information of thousands of members potentially exposed. To read more:

Intel CPUs
Intel processors have been impacted by a new vulnerability that enables attackers to leak encrypted data from the CPU’s internal processes. The side-channel attack is known as PortSmash. To read more:

Hackers have apparently compromised at least 81,000 Facebook users’ private messages. Facebook, by contrast, said its security had not been compromised. To read more:

Government malware
A US government network was infected with malware because of one employee’s “extensive history” of watching porn on his work computer. Investigators found that his Android cell phone was also infected with malware. To read more:

This Australian shipbuilder and defense contractor revealed a data breach and extortion attempt, but insisted it had no intention of acceding to the demands. Some staff email addresses and phone numbers were exposed during the breach. To read more:

This European train-service operator is advising customers to reset their passwords after it detected a systems hack. The company sent an email to customers warning that it had identified an “unauthorized automated attempt to access Eurostar accounts using your email address and passwords.” To read more:

Reported Vulnerabilities

A new set of zero-day vulnerabilities called Bleedingbit could expose enterprises to remote code-execution attacks worldwide. The targeted Bluetooth Low Energy (BLE) chips are used in millions of Cisco, Meraki and Aruba wireless access points. To read more:

A connected construction crane from Asia’s Telecrane has a vulnerability that would enable an attacker to intercept its communications and take over the equipment. To read more:

Kitronik, a British maker of electronic-project kits, says a recent data breach impacting its online shoppers is the work of Magecart. This payment-card-skimming malware was operating on Kitronik’s website from August to September this year. To read more:

Want to learn more?

Sign up below and receive these reports and more directly in your inbox.

Like the report? Sign up below and get it in your inbox.

The registered trademark Linux® is used pursuant to a sublicense from the Linux Foundation, the exclusive licensee of Linus Torvalds, owner of the mark on a world­wide basis.