Skip to content

IoT OT Security News

  • Tracking
  • In The Era
  • CISA KEV
  • Security by Design
  • Statistics
  • About
IoT OT Security News

Tag: Autoriteit Persoonsgegevens

Uber が無視する脆弱性:Uber.com からの偽メールに警戒が必要

Uber ignores vulnerability that lets you send any email from Uber.com

2022/01/02 BleepingComputer — Uber の電子メール・システムの脆弱性により、誰もが Uber に代わって電子メールを送信できることが判明した。この欠陥を発見した研究者は、脅威アクターによる脆弱性の悪用で、2016年のデータ流出で情報が流出した、5700万人の Uber ユーザー/ドライバーに偽メールを送ることができると警告している。Uber は、この欠陥を認識しているようだが、今のところ修正していない。

Continue reading “Uber が無視する脆弱性:Uber.com からの偽メールに警戒が必要”
Unknown's avatarAuthor AiototsecPosted on January 2, 2022January 10, 2022Categories Privacy, Scammer, Vulnerability, _IndustryTags Autoriteit Persoonsgegevens, Bug Bounty, DKIM, DMARC, HackerOne, ICO, Industry, Phishing, Privacy, Scammer, SendGrid, Spam Email, Uber, Vulnerability

Categories Dropdown

  • Twitter
  • Facebook
May 2026
M T W T F S S
 123
45678910
11121314151617
18192021222324
25262728293031
« Apr    

Top Posts & Pages

  • ChatGPT/Claude/Gemini などでジェイルブレイクが発覚:"sockpuppeting" と呼ばれる手法
  • GitHub Issue 通知を悪用するキャンペーン:悪意の OAuth アプリを介して開発環境を侵害
  • 米 FCC による China Telecom 免許取り消しの経緯
  • Ivanti EPM の脆弱性 CVE-2024-10811/13161/13160/13159:PoC が提供
  • Microsoft の緊急アップデート KB5085516:Windows 11 の Sign-In 不具合を修正
  • Claude Mythos が証明した脆弱性発見能力:Firefox の 271 件のゼロデイを単一の評価で検出
  • Windows SYSTEM 権限を取得する3つのテクニック:Filtering Platform の悪用方法とは?
  • Kinsing による Kubernetes 攻撃:PostgreSQL のミスコンフィグを狙っている
  • Bridgestone にサイバー攻撃が発生:米国の生産施設で操業が停止した
  • CrowdStrike LogScale の脆弱性 CVE-2026-40050 が FIX:システム・ファイルへの不正アクセスの恐れ

Categories

API APT Asia AuthN AuthZ BruteForce BugBounty CyberAttack DarkWeb DataBreach DataLeak DDoS DoubleExtortion Exploit Geopolitics Literacy LOLbin MageCartAttack Malware MCP MisConfiguration NHI Outage ParadigmShift Privacy Protection RaaS Ransomware RAT Repository Research Resilience Scammer SecTools SocialEngineering SupplyChain TTP Uncategorized Vulnerability WateringHoleAttack Zero Trust _AI/ML _CDN _Cloud _Container _CryptCcurrency _Defence _Education _Finance _Government _HealthCare _Human _ICS _IDS/IPS _Industry _Infrastructure _Mobile _OpenSource _PLC _Regulation _Retail _RTOS _Space _Statistics _Storage _Telecom _Transportation

Archives

  • April 2026 (162)
  • March 2026 (183)
  • February 2026 (185)
  • January 2026 (177)
  • December 2025 (159)
  • November 2025 (156)
  • October 2025 (177)
  • September 2025 (172)
  • August 2025 (165)
  • July 2025 (176)
  • June 2025 (192)
  • May 2025 (216)
  • April 2025 (192)
  • March 2025 (208)
  • February 2025 (181)
  • January 2025 (185)
  • December 2024 (172)
  • November 2024 (166)
  • October 2024 (184)
  • September 2024 (171)
  • August 2024 (183)
  • July 2024 (188)
  • June 2024 (156)
  • May 2024 (156)
  • April 2024 (155)
  • March 2024 (151)
  • February 2024 (131)
  • January 2024 (132)
  • December 2023 (116)
  • November 2023 (131)
  • October 2023 (124)
  • September 2023 (101)
  • August 2023 (111)
  • July 2023 (110)
  • June 2023 (113)
  • May 2023 (129)
  • April 2023 (127)
  • March 2023 (129)
  • February 2023 (118)
  • January 2023 (138)
  • December 2022 (106)
  • November 2022 (114)
  • October 2022 (120)
  • September 2022 (118)
  • August 2022 (133)
  • July 2022 (97)
  • June 2022 (117)
  • May 2022 (94)
  • April 2022 (112)
  • March 2022 (132)
  • February 2022 (105)
  • January 2022 (128)
  • December 2021 (111)
  • November 2021 (100)
  • October 2021 (110)
  • September 2021 (131)
  • August 2021 (105)
  • July 2021 (105)
  • June 2021 (103)
  • May 2021 (72)
  • April 2021 (58)

Categories

  • API (240)
  • APT (525)
  • Asia (398)
  • AuthN AuthZ (797)
  • BruteForce (67)
  • BugBounty (76)
  • CyberAttack (3,327)
  • DarkWeb (228)
  • DataBreach (554)
  • DataLeak (194)
  • DDoS (164)
  • DoubleExtortion (15)
  • Exploit (1,494)
  • Geopolitics (6)
  • Literacy (2,381)
  • LOLbin (60)
  • MageCartAttack (15)
  • Malware (1,466)
  • MCP (16)
  • MisConfiguration (62)
  • NHI (10)
  • Outage (106)
  • ParadigmShift (181)
  • Privacy (245)
  • Protection (649)
  • RaaS (122)
  • Ransomware (736)
  • RAT (785)
  • Repository (350)
  • Research (1,210)
  • Resilience (133)
  • Scammer (615)
  • SecTools (247)
  • SocialEngineering (52)
  • SupplyChain (435)
  • TTP (1,001)
  • Uncategorized (18)
  • Vulnerability (5,001)
  • WateringHoleAttack (4)
  • Zero Trust (382)
  • _AI/ML (470)
  • _CDN (4)
  • _Cloud (369)
  • _Container (73)
  • _CryptCcurrency (40)
  • _Defence (162)
  • _Education (8)
  • _Finance (161)
  • _Government (1,101)
  • _HealthCare (47)
  • _Human (51)
  • _ICS (85)
  • _IDS/IPS (182)
  • _Industry (221)
  • _Infrastructure (129)
  • _Mobile (162)
  • _OpenSource (1,397)
  • _PLC (39)
  • _Regulation (158)
  • _Retail (78)
  • _RTOS (6)
  • _Space (26)
  • _Statistics (422)
  • _Storage (70)
  • _Telecom (77)
  • _Transportation (56)
  • Tracking
  • In The Era
  • CISA KEV
  • Security by Design
  • Statistics
  • About
IoT OT Security News Blog at WordPress.com.
  • Subscribe Subscribed
    • IoT OT Security News
    • Join 168 other subscribers
    • Already have a WordPress.com account? Log in now.
    • IoT OT Security News
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar