logo
  • About
  • Contact
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • MISCONFIGURED WBSC SERVER LEAKS THOUSANDS OF PASSPORTS
  • Menorah Malware: APT34’s Latest Cyberweapon Unmasked by Trend Micro
  • Diverse threat intelligence key to cyberdefense against nation-state attacks
  • Malicious ad served inside Bing’s AI chatbot
  • US State Department Says 60,000 Emails Taken in Alleged Chinese Hack

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-41691 (woocommerce_pensopay) 29 September 2023
  • CVE-2023-43739 (online_book_store_project) 28 September 2023
  • CVE-2023-44166 (online_movie_ticket_booking_system) 28 September 2023
  • CVE-2023-44167 (online_movie_ticket_booking_system) 28 September 2023
  • CVE-2023-43014 (asset_management_system) 28 September 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Source code leak took place due to a misconfiguration error.

Posted on 27 July 2020

From hackread.com

A misconfiguration in the infrastructure of repositories resulted in leaking the source code of dozens of mainstream, high-profile organizations from diverse sectors from tech, food, retail, finance, manufacturing, and e-commerce.

Read more…

Posted in News

Post navigation

Previous post: Autoenum – Automatic Service Enumeration Script
Next post: “ATT&CK with Sub-Techniques” is Now Just ATT&CK
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.