Contact us
+(562) 2486 3850
REPORT AN INCIDENT
How and when to report?
Summary The Computer Security Incident Response Team, CSIRT, shares information obtained from the official FortiGuard site regarding a vulnerability that affects its DHCP monitoring tool, which, if exploited, can result in persistent remote XSS attacks ( Stored Cross-site Scripting). The report contains information about updates to mitigate risk. Vulnerability CVE-2019-6697 Impact The DHCP monitor from […]
Summary The Computer Security Incident Response Team, CSIRT, shares information obtained from the official Microsoft site, referring to a vulnerability that affects your mobile messaging application, Outlook, which, if exploited, can result in a type attack spoofing (user impersonation). This report includes the respective update to mitigate the risk. Vulnerability CVE-2019-1460 Impact An attacker could […]
Summary The Computer Security Incident Response Team, CSIRT, shares information about camera vulnerability on mobile devices used for Android and Google. If the vulnerability is exploited, it may result in unauthorized use of the camera to steal user data. Vulnerability CVE-2019-2234 Impact A malicious application could take control of the mobile device’s camera, being able […]
Summary The Computer Security Incident Response Team, CSIRT, shares the information realesed by Facebook regarding to a vulnerability present in its WhatsApp messaging client. Vulnerability CVE-2019-11931 Impact A buffer overflow could be activated in WhatsApp by sending a specially designed MP4 file to a WhatsApp user. The problem was present when analyzing the elementary stream […]
Summary The Computer Security Incident Response Team, CSIRT, shares the information provided by Microsoft in its monthly update report for November 2019, publishing 2 notices and updates for 74 vulnerabilities in its software, 13 of them, classified as critical. Vulnerability Informed in the October newsletter ADV190024 […]
In this form, you'll be able to report an incident using the following clasification: Abusive content, Malicious Code, Information Gathering, Intrusion Attemps, Intrusions, Availability, Information Content Security, Fraud, Vulnerable, Other, Test.