{"text": "Phishing and other hacking incidents have led to several recently reported large health data breaches , including one that UConn Health reports affected 326,000 individuals .", "event": [{"event_trigger": "Phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "In describing a phishing attack , UConn Health says that on Dec 24 , 2018 , it determined that an unauthorized third party illegally accessed a limited number of employee email accounts containing patient information , including some individuals ' names , dates of birth , addresses and limited medical information , such as billing and appointment information .", "event": [{"event_trigger": "phishing attack", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "UConn Health", "role": "victim", "argument_pos": []}, {"argument": "Dec 24 , 2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Several other healthcare entities also have recently reported to federal regulators data breaches involving apparent phishing and other email - related attacks .", "event": [{"event_trigger": "data breaches", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "healthcare entities", "role": "victim", "argument_pos": []}, {"argument": "email - related attacks", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "UConn Health , an academic medical center , says in a media statement that it identified approximately 326,000 potentially impacted individuals whose personal information was contained in the compromised email accounts .", "event": [{"event_trigger": "compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "email accounts", "role": "compromised data", "argument_pos": []}, {"argument": "326,000", "role": "number of victim", "argument_pos": []}, {"argument": "individuals", "role": "victim", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "\" It is important to note that , at this point , UConn Health does not know for certain if any personal information was ever viewed or acquired by the unauthorized party , and is not aware of any instances of fraud or identity theft as a result of this incident , \" the statement notes .", "event": [{"event_trigger": "viewed or acquired", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "unauthorized party", "role": "attacker", "argument_pos": []}, {"argument": "UConn Health", "role": "victim", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}, {"argument": "fraud or identity theft", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Once the U.S.Department of Health and Human Services confirms the details , the attack on UConn Health could rank as the second largest health data breach reported so far this year , based on a snapshot of its HIPAA Breach Reporting Tool website on Monday .", "event": [{"event_trigger": "health data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "this year", "role": "time", "argument_pos": []}, {"argument": "UConn Health", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The largest health data breach revealed so far this year , but not yet added to the tally , affected University of Washington Medicine .", "event": [{"event_trigger": "health data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "University of Washington Medicine", "role": "victim", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "UW Medicine says a misconfigured database left patient data exposed on the internet for several weeks last December , resulting in a breach affecting 974,000 individuals .", "event": [{"event_trigger": "breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "974,000", "role": "number of victim", "argument_pos": []}, {"argument": "individuals", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Several other phishing and hacking incidents have been added to the HHS \" wall of shame \" tally in recent weeks .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "RMIA 's statement notes that while the investigation did not identify any evidence of unauthorized access to anyone 's personal information , \" we unfortunately could not completely rule out the possibility that patients ' personal information , including name , address , date of birth , health insurance information , limited treatment information and , for donors only , Social Security number , may have been accessible . \"", "event": [{"event_trigger": "unauthorized access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "anyone", "role": "victim", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "In a Jan 29 statement , the entity says that on Nov 30 , 2018 , it learned that an unauthorized actor may have gained access to some of its employees ' email accounts between Nov 15 and Dec 1 , 2018 , \" Our investigation determined that some patient information may have been contained in the email accounts , patients ' names , medical record numbers , information about services they received from Roper St.Francis , health insurance information , and , in some cases , Social Security numbers and financial information , \" the statement says .", "event": [{"event_trigger": "gained access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "unauthorized actor", "role": "attacker", "argument_pos": []}, {"argument": "employees", "role": "victim", "argument_pos": []}, {"argument": "email accounts", "role": "compromised data", "argument_pos": []}, {"argument": "between Nov 15 and Dec 1 , 2018", "role": "time", "argument_pos": []}, {"argument": "patient information", "role": "compromised data", "argument_pos": []}, {"argument": "email accounts", "role": "compromised data", "argument_pos": []}, {"argument": "patients", "role": "victim", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "medical record numbers", "role": "compromised data", "argument_pos": []}, {"argument": "information about services", "role": "compromised data", "argument_pos": []}, {"argument": "Roper St.Francis", "role": "victim", "argument_pos": []}, {"argument": "health insurance information", "role": "compromised data", "argument_pos": []}, {"argument": "Social Security numbers", "role": "compromised data", "argument_pos": []}, {"argument": "financial information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "For those patients whose Social Security number was potentially exposed , the organization is offering prepaid credit monitoring and identity protection services .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Social Security number", "role": "compromised data", "argument_pos": []}, {"argument": "patients", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "As phishing continues to menace healthcare entities , covered entities and business associates need to keep up with their defenses , some experts note .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "healthcare entities", "role": "victim", "argument_pos": []}, {"argument": "covered entities", "role": "victim", "argument_pos": []}, {"argument": "business associates", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "\" Workforce training should include simulated phishing attacks to make people better prepared to recognize and thwart a real attack . \"", "event": [{"event_trigger": "simulated phishing attacks", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "But McMillan advises healthcare organizations to avoid using multifactor authentication systems that use SMS to transmit a one - time password because those messages can be intercepted .", "event": [{"event_trigger": "be intercepted", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "messages", "role": "compromised data", "argument_pos": []}, {"argument": "one - time password", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "So what other technologies or best practices should covered entities and business associates consider to prevent falling victim to phishing and other attacks ?", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "business associates", "role": "victim", "argument_pos": []}, {"argument": "covered entities", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "\" Unfortunately we have n't seen any silver bullets here yet , but one thing we might want to begin exploring is just what an attacker has access to when they compromise a user 's account , \" McMillan notes .", "event": [{"event_trigger": "access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "\" All too often , we hear that the accounts compromised had incredibly large numbers of emails immediately accessible to the attacker .", "event": [{"event_trigger": "accessible", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the attacker", "role": "attacker", "argument_pos": []}, {"argument": "emails", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The Equifax data breach in which millions of Americans had their personal details stolen may have been carried out by a foreign government in a bid to recruit U.S. spies , experts believe .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Equifax", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Hackers took addresses , dates of birth , Social Security details and credit card numbers from 148million people when they targeted the credit ratings giant Equifax in 2017 .", "event": [{"event_trigger": "took", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Hackers", "role": "attacker", "argument_pos": []}, {"argument": "addresses", "role": "compromised data", "argument_pos": []}, {"argument": "dates of birth", "role": "compromised data", "argument_pos": []}, {"argument": "Social Security details", "role": "compromised data", "argument_pos": []}, {"argument": "credit card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "148million", "role": "number of victim", "argument_pos": []}, {"argument": "people", "role": "victim", "argument_pos": []}, {"argument": "Equifax", "role": "victim", "argument_pos": []}, {"argument": "2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "It has also been suggested that the criminals who stole the data feared detection if they sold it online and have kept it to themselves to avoid capture .", "event": [{"event_trigger": "stole", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "criminals", "role": "attacker", "argument_pos": []}, {"argument": "sold it online", "role": "purpose", "argument_pos": []}, {"argument": "kept it to themselves", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Equifax , one of America 's three leading consumer reporting agencies , announced the huge data hack in September 2017 and its CEO Richard Smith resigned later that month .", "event": [{"event_trigger": "hack", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "September 2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Hackers gained access to 48 databases between May 13 and July 29 when Equifax noticed the intrusion , the report said .", "event": [{"event_trigger": "gained access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "48", "role": "number of data", "argument_pos": []}, {"argument": "Hackers", "role": "attacker", "argument_pos": []}, {"argument": "databases", "role": "compromised data", "argument_pos": []}, {"argument": "between May 13 and July 29", "role": "time", "argument_pos": []}, {"argument": "Equifax", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Last year the firm admitted that passport images and information had also been stolen .", "event": [{"event_trigger": "been stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "information", "role": "compromised data", "argument_pos": []}, {"argument": "passport images", "role": "compromised data", "argument_pos": []}, {"argument": "firm", "role": "victim", "argument_pos": []}, {"argument": "Last year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "' Had the company taken action to address its observable security issues prior to this cyberattack , the data breach could have been prevented , ' the committee 's report said .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "A pair of iOS bugs identified as resolved by Apple in its latest iOS 12.1.4 release were successfully exploited by hackers , according to a Google researcher who shared details of the zero - day vulnerabilities on Thursday .", "event": [{"event_trigger": "resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "iOS bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "12.1.4 release", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Apple 's latest iOS 12.1.4 release , issued earlier today , contains fixes for Foundation and IOKit flaws that , according to security researcher Ben Hawkes , were used to hack devices in the wild .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "earlier today", "role": "time", "argument_pos": []}, {"argument": "12.1.4 release", "role": "patch number", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "Foundation and IOKit flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "used to hack devices", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "As noted by ZDNet , Hawkes , leader of Google 's Project Zero security team , shared the revelation on Twitter late Thursday , saying the iOS bugs were leveraged as zero - day vulnerabilities .", "event": [{"event_trigger": "shared the revelation", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "Google", "role": "discoverer", "argument_pos": []}, {"argument": "Hawkes", "role": "discoverer", "argument_pos": []}, {"argument": "leader", "role": "discoverer", "argument_pos": []}, {"argument": "Project Zero security team", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "How , exactly , the vulnerabilities were exploited and by whom is unknown .", "event": [{"event_trigger": "were exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Both bugs were detailed in Apple documentation detailing security changes delivered with the iOS 12.1.4 package .", "event": [{"event_trigger": "delivered", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "12.1.4", "role": "patch number", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Logged with the identifier CVE -2019-7286 , the Foundation flaw involves a memory corruption issue that could allow an app to gain elevated privileges in iPhone 5s and later , iPad Air and later , and iPod touch 6th generation .", "event": [{"event_trigger": "Logged with the identifier", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2019-7286", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the Foundation flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "memory corruption issue", "role": "vulnerability", "argument_pos": []}, {"argument": "allow an app to gain elevated privileges", "role": "capabilities", "argument_pos": []}, {"argument": "iPod touch 6th generation", "role": "vulnerable system", "argument_pos": []}, {"argument": "iPad Air", "role": "vulnerable system", "argument_pos": []}, {"argument": "iPhone 5s", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "An anonymous researcher , Clement Lecigne of Google Threat Analysis Group , Ian Beer of Google Project Zero and Samuel Grob of Google Project Zero were credited with finding the flaw .", "event": [{"event_trigger": "finding", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "researcher", "role": "discoverer", "argument_pos": []}, {"argument": "Clement Lecigne", "role": "discoverer", "argument_pos": []}, {"argument": "Google Threat Analysis Group", "role": "discoverer", "argument_pos": []}, {"argument": "Ian Beer", "role": "discoverer", "argument_pos": []}, {"argument": "Google Project Zero", "role": "discoverer", "argument_pos": []}, {"argument": "Google Project Zero", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The second bug , identified as CVE -2019-7287 , also involves a memory corruption , but instead of granting elevated privileges it allows an app to executive code with kernel privileges on iPhone 5s and later , iPad Air and later , and iPod touch 6th generation .", "event": [{"event_trigger": "identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2019-7287", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "bug", "role": "vulnerability", "argument_pos": []}, {"argument": "memory corruption", "role": "capabilities", "argument_pos": []}, {"argument": "allows an app to executive code with kernel privileges", "role": "capabilities", "argument_pos": []}, {"argument": "iPhone 5s", "role": "vulnerable system", "argument_pos": []}, {"argument": "iPad Air", "role": "vulnerable system", "argument_pos": []}, {"argument": "iPod touch 6th generation", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The same researchers were credited with the find .", "event": [{"event_trigger": "find", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "same researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Apple released iOS 12.1.4 alongside a supplemental update to macOS Mojave to address the widely publicized FaceTime flaw that allowed interlopers to eavesdrop on Group FaceTime calls .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "12.1.4", "role": "patch number", "argument_pos": []}, {"argument": "supplemental update", "role": "patch", "argument_pos": []}, {"argument": "macOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mojave", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The update also patched a Live Photos in FaceTime bug that was discovered after Apple conducted a \" thorough security audit \" of the service .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "Live Photos", "role": "vulnerable system", "argument_pos": []}, {"argument": "FaceTime bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Details of the Live Photos vulnerability have yet to be made public .", "event": [{"event_trigger": "made public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Live Photos vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A security flaw affecting LibreOffice and Apache OpenOffice has been fixed in one of the two open - source office suites .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "LibreOffice", "role": "vulnerable system", "argument_pos": []}, {"argument": "Apache OpenOffice", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The other still appears to be vulnerable .", "event": [{"event_trigger": "be vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Before attempting to guess which app has yet to be patched , consider that Apache OpenOffice for years has struggled attract more contributors .", "event": [{"event_trigger": "be patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "app", "role": "vulnerable system", "argument_pos": []}, {"argument": "Apache OpenOffice", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The upshot is : security holes are n't being patched , it seems .", "event": [{"event_trigger": "being patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security holes", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The issue , identified by security researcher Alex Inführ , is that there 's a way to achieve remote code execution by triggering an event embedded in an ODT ( OpenDocument Text ) file .", "event": [{"event_trigger": "identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security researcher Alex Inführ", "role": "discoverer", "argument_pos": []}, {"argument": "issue", "role": "vulnerability", "argument_pos": []}, {"argument": "achieve remote code execution by triggering an event embedded in an ODT ( OpenDocument Text ) file", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "In a blog post on Friday , Inführ explains how he found a way to abuse the OpenDocument scripting framework by adding an onmouseover event to a link in an ODT file .", "event": [{"event_trigger": "explains", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Inführ", "role": "discoverer", "argument_pos": []}, {"argument": "Friday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "After trying various approaches to exploit the vulnerability , Inführ found that he could rig the event to call a specific function within a Python file included with the Python interpreter that ships with LibreOffice .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Inführ", "role": "discoverer", "argument_pos": []}, {"argument": "LibreOffice", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Inführ says he reported the bug on October 18 and it was fixed in LibreOffice by the end of the month .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Inführ", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "RedHat assigned it CVE -2018-16858 in mid-November and gave Inführ a disclosure date of January 31 , 2019 .", "event": [{"event_trigger": "assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-16858", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "mid-November", "role": "time", "argument_pos": []}, {"argument": "RedHat", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "When he published on February 1 , in conjunction with the LibreOffice fix notification , OpenOffice still had not been patched .", "event": [{"event_trigger": "published", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "February 1", "role": "time", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Inführ says he reconfirmed that he could go ahead with disclosure even though OpenOffice 4.16 has yet to be fixed .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Inführ", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "However , he says that the path traversal issue can still be abused to execute a local Python file and cause further mischief and damage .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "path traversal issue", "role": "vulnerability", "argument_pos": []}, {"argument": "abused to execute a local Python file", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "We 're imagining specifically targeted netizens being tricked into opening a ZIP file , unpacking an ODT and Python script , and then the ODT document attempting to execute the Python script when the victim rolls their mouse over a link , for instance .", "event": [{"event_trigger": "being tricked", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "netizens", "role": "victim", "argument_pos": []}, {"argument": "opening a ZIP file", "role": "attack pattern", "argument_pos": []}, {"argument": "unpacking an ODT and Python script", "role": "attack pattern", "argument_pos": []}, {"argument": "execute the Python script", "role": "purpose", "argument_pos": []}, {"argument": "the victim", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "I 'm willing to bet many at Apple are trying hard to forget it right now as news breaks of a vulnerability in the group functionality of its FaceTime application that allows users to eavesdrop on the people being called , even if they did n't pick up the call !", "event": [{"event_trigger": "news breaks", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "FaceTime application", "role": "vulnerable system", "argument_pos": []}, {"argument": "allows users to eavesdrop on the people being called", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "What 's more , the bug is n't limited to iPhone users and if the recipient is using a Mac then , as it rings for a longer default than a handset , the eavesdropping can potentially continue for a longer period .", "event": [{"event_trigger": "eavesdropping", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "a handset", "role": "victim", "argument_pos": []}, {"argument": "Mac", "role": "victim", "argument_pos": []}, {"argument": "iPhone users", "role": "victim", "argument_pos": []}, {"argument": "the recipient", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The good news is that Apple has responded by temporarily suspending the Group FaceTime functionality until a permanent fix can be rolled out .", "event": [{"event_trigger": "rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "permanent fix", "role": "patch", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "An Apple spokesperson told BuzzFeed that a fix \" will be released in a software update later this week . \"", "event": [{"event_trigger": "will be released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fix", "role": "patch", "argument_pos": []}, {"argument": "software update", "role": "patch", "argument_pos": []}, {"argument": "later this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "However , there have been reports of some users still able to exploit the eavesdropping vulnerability even after Apple made this announcement , 9to5Mac being among them .", "event": [{"event_trigger": "reports", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "eavesdropping vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Apple", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Officials based at the City of Del Rio , in Texas , were forced to abandon electronic services and switch to pen and paper after a ransomware attack effectively closed down City Hall servers .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "City Hall servers", "role": "victim", "argument_pos": []}, {"argument": "Texas", "role": "place", "argument_pos": []}, {"argument": "City of Del Rio", "role": "victim", "argument_pos": []}, {"argument": "Officials", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The city was struck by the ransomware on Thursday , leading to all servers being disabled to prevent further spread .", "event": [{"event_trigger": "was struck", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "city", "role": "victim", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}, {"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "It is not known at present who is behind the ransomware , what kind of malware is at fault , or whether or not any personal data has been compromised .", "event": [{"event_trigger": "been compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "personal data", "role": "compromised data", "argument_pos": []}, {"argument": "malware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The Texan city has also not revealed how much the ransomware demanded in payment , as is usually the case with this particular form of malware .", "event": [{"event_trigger": "demanded in payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransomware", "role": "tool", "argument_pos": []}, {"argument": "Texan city", "role": "victim", "argument_pos": []}, {"argument": "malware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Ransoms are usually requested in return for a decryption key -- which may or may not work -- in order to unlock encrypted systems and restore access .", "event": [{"event_trigger": "Ransoms", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "However , a Del Rio City Hall spokeswoman did reveal that the malware is somewhat unusual , as the ransom note posted to roughly 30 - 45 PCs contained a phone number to be used to pay the blackmail fee .", "event": [{"event_trigger": "pay the blackmail", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransom note", "role": "tool", "argument_pos": []}, {"argument": "malware", "role": "tool", "argument_pos": []}, {"argument": "PCs", "role": "victim", "argument_pos": []}, {"argument": "Del Rio City Hall", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Most of the time , a note will be posted on a landing page containing instructions for paying ransom in cryptocurrency and victims will be given a wallet address , rather than a means to directly call the malware 's operator .", "event": [{"event_trigger": "paying ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "note", "role": "tool", "argument_pos": []}, {"argument": "cryptocurrency", "role": "payment method", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "a wallet address", "role": "payment method", "argument_pos": []}, {"argument": "call the malware 's operator", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "To remove the ransomware , the culprit behind the strain has demanded either a ransom of 10 BTC to be paid or a malicious software that could potentially infect thousands be downloaded by the victim .", "event": [{"event_trigger": "has demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the strain", "role": "tool", "argument_pos": []}, {"argument": "culprit", "role": "attacker", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers have discovered some serious security flaws threatening Linux .", "event": [{"event_trigger": "have discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Researchers", "role": "discoverer", "argument_pos": []}, {"argument": "serious security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Linux", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "These vulnerabilities exist in Linux systemd component .", "event": [{"event_trigger": "exist in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Linux systemd component", "role": "vulnerable system", "argument_pos": []}, {"argument": "These vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Allegedly , researchers at Qualys have disclosed some bugs targeting the Linux systemd component .", "event": [{"event_trigger": "have disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Linux systemd component", "role": "vulnerable system", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Qualys", "role": "discoverer", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "As revealed , three vulnerabilities have targeted the systemd - journald , which is responsible for data collection and log storage .", "event": [{"event_trigger": "revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "three vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the systemd - journald", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The researchers state that these vulnerabilities threaten all Linux distros based on systemd except a few .", "event": [{"event_trigger": "state", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Linux distros based on systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "these vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "The researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "As stated in their report , “ To the best of our knowledge , all systemd - based Linux distributions are vulnerable , but SUSE Linux Enterprise 15 , openSUSE Leap 15.0 , and Fedora 28 and 29 are not exploitable because their user space is compiled with GCC ’s - fstack - clash - protection . ”", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "systemd - based Linux distributions", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "At first , the researchers accidentally discovered CVE -2018-16864 while working on an exploit for a previously disclosed vulnerability , Mutagen Astronomy .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the researchers", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-16864", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a previously disclosed vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Then , when they were busy on its PoC , they spotted the other two bugs .", "event": [{"event_trigger": "spotted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "discoverer", "argument_pos": []}, {"argument": "the other two bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "“ We developed a proof of concept for CVE -2018-16864 that gains eip control on i386 … We developed an exploit for CVE -2018-16865 and CVE -2018-16866 that obtains a local root shell in 10 minutes on i386 and 70 minutes on amd64 , on average . ”", "event": [{"event_trigger": "developed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a proof of concept", "role": "vulnerability", "argument_pos": []}, {"argument": "We", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-16864", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "gains eip control", "role": "capabilities", "argument_pos": []}, {"argument": "i386", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "For now , Red Hat has patched the bugs CVE -2018-16864 and CVE -2018-16865 .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Red Hat", "role": "releaser", "argument_pos": []}, {"argument": "the bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-16864", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-16865", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Whereas , Debian has fixed CVE -2018-16866 in the unstable systemd 240 - 1 release .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Debian", "role": "releaser", "argument_pos": []}, {"argument": "CVE -2018-16866", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "240 - 1 release", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Other distros will also supposedly release the fixes soon .", "event": [{"event_trigger": "release", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "distros", "role": "vulnerable system", "argument_pos": []}, {"argument": "the fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In November 2018 , a Google researcher also highlighted a critical flaw in Systemd that induced system crashes and hacks .", "event": [{"event_trigger": "highlighted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "November 2018", "role": "time", "argument_pos": []}, {"argument": "a critical flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "induced system crashes and hacks", "role": "capabilities", "argument_pos": []}, {"argument": "a Google researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Juniper Networks has released its first cluster of security updates for 2019 , with the patches addressing vulnerabilities in various products developed by the US networking equipment firm .", "event": [{"event_trigger": "addressing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the patches", "role": "patch", "argument_pos": []}, {"argument": "various products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Among the 19 security advisories released on Wednesday is a critical bug impacting Junos OS , the FreeBSD - based operating system used in Juniper ’s routers .", "event": [{"event_trigger": "impacting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Junos OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "the FreeBSD - based operating system", "role": "vulnerable system", "argument_pos": []}, {"argument": "routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "Juniper", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2019-0006 affects Junos OS versions 14.1 X53 , 15.1 , 15.1 X53 , where it was found that a specially crafted HTTP packet could crash the fxpc daemon or could potentially lead to remote code execution ( RCE ) .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Junos OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "CVE -2019-0006", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "versions 14.1 X53", "role": "vulnerable system version", "argument_pos": []}, {"argument": "15.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "15.1 X53", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Also marked as critical is CVE -2019-0007 , which addresses a vulnerability in vMX series virtual routers running Junos OS 15.1 .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2019-0007", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "vMX series virtual routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "Junos OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "15.1", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Patches have also been released for eight vulnerabilities in the libxml2 software library that impact Junos OS .", "event": [{"event_trigger": "have also been released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "eight vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the libxml2 software library", "role": "vulnerable system", "argument_pos": []}, {"argument": "Patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Eight additional security updates have been released by Juniper that feature mitigations for high - level impact bugs , while a further six deal with less severe flaws .", "event": [{"event_trigger": "have been released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Juniper", "role": "releaser", "argument_pos": []}, {"argument": "high - level impact bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "less severe flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "security updates", "role": "patch", "argument_pos": []}, {"argument": "mitigations", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Multiple vulnerabilities were also discovered in Juniper ’s Advanced Threat Prevention ( ATP ) cloud security service .", "event": [{"event_trigger": "were also discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Multiple vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Advanced Threat Prevention ( ATP ) cloud security service", "role": "vulnerable system", "argument_pos": []}, {"argument": "Juniper", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "And finally , Juniper said nearly 40 vulnerabilities have been resolved in the Junos Space Network Management Platform 18.3 R1 and 18.4 R1 by upgrading third party components or fixing internally discovered security vulnerabilities .", "event": [{"event_trigger": "have been resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Junos Space Network Management Platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "40 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "18.3 R1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "18.4 R1", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "This week , Adobe has released its very first Patch Tuesday update bundle for the year 2019 .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the year 2019", "role": "time", "argument_pos": []}, {"argument": "update bundle", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "This week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "It has also released patches for Flash Player , but they are not security fixes .", "event": [{"event_trigger": "has also released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "It", "role": "releaser", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "security fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "This Tuesday , Adobe has rolled - out scheduled monthly updates for its products .", "event": [{"event_trigger": "has rolled - out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "its products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Besides , the update bundle is relatively smaller , unlike the previous updates that addressed tens of vulnerabilities .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "tens of vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the previous updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "According to the security advisory , Adobe has fixed an important security vulnerability in Adobe Digital Editions .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "an important security vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Digital Editions", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Reportedly , it ’s an out of bounds read flaw ( CVE -2018-12817 ) that affected the software version 4.5.9 and earlier for all platforms , i.e. , Windows , MacOS , Android and iOS .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-12817", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "an out of bounds read flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Android", "role": "vulnerable system", "argument_pos": []}, {"argument": "MacOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "all platforms", "role": "vulnerable system", "argument_pos": []}, {"argument": "software", "role": "vulnerable system", "argument_pos": []}, {"argument": "version 4.5.9", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Users should ensure updating their devices with the patched Adobe Digital Editions version 4.5.10 .", "event": [{"event_trigger": "updating", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "version 4.5.10", "role": "patch number", "argument_pos": []}, {"argument": "patched Adobe Digital Editions", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to the above , another important vulnerability existed in Adobe Connect that could result in session token exposure .", "event": [{"event_trigger": "existed in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Connect", "role": "vulnerable system", "argument_pos": []}, {"argument": "result in session token exposure", "role": "capabilities", "argument_pos": []}, {"argument": "another important vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability affected the Adobe Connect versions 9.8.1 and earlier for all platforms .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Connect", "role": "vulnerable system", "argument_pos": []}, {"argument": "all platforms", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 9.8.1", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Users should , hence , ensure updating their systems with the patched version 10.1 .", "event": [{"event_trigger": "updating", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "patched version 10.1", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Besides the two security fixes , Adobe have released patches for Flash Player as well addressing performance issues .", "event": [{"event_trigger": "have released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "security fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "As described in the Adobe advisory , “ Adobe has released updates for Adobe Flash Player for Windows , macOS , Linux and Chrome OS .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}, {"argument": "Linux", "role": "supported platform", "argument_pos": []}, {"argument": "Chrome OS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "These updates address feature and performance bugs , and do not include security fixes . ”", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "These updates", "role": "patch", "argument_pos": []}, {"argument": "feature and performance bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "security fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The patched Flash Player version 32.0.0.114 has been rolled - out to be downloaded across all platforms .", "event": [{"event_trigger": "has been rolled - out to be downloaded", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The patched Flash Player version 32.0.0.114", "role": "patch number", "argument_pos": []}, {"argument": "all platforms", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "This time , the update bundle did not address security problems in Adobe Reader or Acrobat .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the update bundle", "role": "patch", "argument_pos": []}, {"argument": "security problems", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "However , the vendors already released security fixes for them in the previous week .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the previous week", "role": "time", "argument_pos": []}, {"argument": "security fixes", "role": "patch", "argument_pos": []}, {"argument": "the vendors", "role": "releaser", "argument_pos": []}, {"argument": "them", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The patch addressed two critical vulnerabilities ( CVE -2018-16011 and CVE -2018-16018 ) that could result in arbitrary code execution and privilege escalation respectively .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The patch", "role": "patch", "argument_pos": []}, {"argument": "two critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-16011", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-16018", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "could result in arbitrary code execution", "role": "issues addressed", "argument_pos": []}, {"argument": "privilege escalation", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft released a security update designed to patch remote code execution ( RCE ) and information disclosure vulnerabilities in its Microsoft Exchange Server 2019 , 2016 , and 2013 products .", "event": [{"event_trigger": "patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "remote code execution ( RCE )", "role": "vulnerability", "argument_pos": []}, {"argument": "information disclosure vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft Exchange Server 2019 , 2016 , and 2013 products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The RCE security issue is being tracked as CVE -2019-0586 and according to Microsoft 's advisory it exists because \" the software fails to properly handle objects in memory . \"", "event": [{"event_trigger": "being tracked as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2019-0586", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The RCE security issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "An attacker who successfully exploited the vulnerability could run arbitrary code in the context of the System user .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "run arbitrary code", "role": "capabilities", "argument_pos": []}, {"argument": "attacker", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In order to exploit the CVE -2019-0586 vulnerability , attackers have to send maliciously crafter emails to a vulnerable Exchange server .", "event": [{"event_trigger": "send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "crafter emails", "role": "tool", "argument_pos": []}, {"argument": "exploit the CVE -2019-0586 vulnerability", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The issue has been addressed by changing the way Microsoft Exchange handles objects in memory .", "event": [{"event_trigger": "has been addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The information disclosure Microsoft Exchange Server vulnerability was assigned the CVE -2019-0588 tracking id and it is caused by the way Microsoft Exchange 's \" PowerShell API grants calendar contributors more view permissions than intended . \"", "event": [{"event_trigger": "was assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The information disclosure Microsoft Exchange Server vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the CVE -2019-0588", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "The CVE -2019-0588 , security vulnerability was fixed by correcting the way Exchange 's PowerShell API grants permissions to contributors .", "event": [{"event_trigger": "was fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2019-0588", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "correcting the way Exchange 's PowerShell API grants permissions", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Award - winning cooking tools company OXO revealed that it has suffered data breaches over the last two years that may have compromised customer and credit card information .", "event": [{"event_trigger": "data breaches", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "cooking tools company OXO", "role": "victim", "argument_pos": []}, {"argument": "the last two years", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "In a breach disclosure letter filed with the State of California , OXO said that the data security incident involved “ sophisticated criminal activity that may have exposed some of your personal information . ”", "event": [{"event_trigger": "have exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "your personal information", "role": "compromised data", "argument_pos": []}, {"argument": "criminal", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The attacker is believed to have accessed credit card information , along with names and billing and shipping addresses , though the letter does not state the scope of impact .", "event": [{"event_trigger": "have accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "credit card information", "role": "compromised data", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "addresses", "role": "compromised data", "argument_pos": []}, {"argument": "The attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "“ On December 17 , 2018 , OXO confirmed through our forensic investigators that the security of certain personal information that you entered into our e-commerce website ( https://www.oxo.com ) may have been compromised .", "event": [{"event_trigger": "have been compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "OXO", "role": "victim", "argument_pos": []}, {"argument": "https://www.oxo.com", "role": "victim", "argument_pos": []}, {"argument": "our e-commerce website", "role": "victim", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}, {"argument": "December 17 , 2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "We currently believe that information entered in the customer order form between June 9 , 2017 – November 28 , 2017 , June 8 , 2018 – June 9 , 2018 , July 20 , 2018 – October 16 , 2018 may have been compromised .", "event": [{"event_trigger": "have been compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "information", "role": "compromised data", "argument_pos": []}, {"argument": "between June 9 , 2017 – November 28 , 2017", "role": "time", "argument_pos": []}, {"argument": "June 8 , 2018 – June 9 , 2018", "role": "time", "argument_pos": []}, {"argument": "July 20 , 2018 – October 16 , 2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "While we believe the attempt to compromise your payment information may have been ineffective , we are notifying you out of an abundance of caution . ”", "event": [{"event_trigger": "compromise", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "your payment information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "OXO is currently working with security consultants and forensic investigators , who are looking at past vulnerabilities in the website as part of an ongoing investigation of the incident .", "event": [{"event_trigger": "are looking", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "OXO", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "security consultants", "role": "discoverer", "argument_pos": []}, {"argument": "forensic investigators", "role": "discoverer", "argument_pos": []}, {"argument": "past vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the website", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Security biz Qualys has revealed three vulnerabilities in a component of systemd , a system and service manager used in most major Linux distributions .", "event": [{"event_trigger": "has revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Security biz Qualys", "role": "discoverer", "argument_pos": []}, {"argument": "three vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "a component of systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "system", "role": "vulnerable system", "argument_pos": []}, {"argument": "service manager", "role": "vulnerable system", "argument_pos": []}, {"argument": "Linux", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Patches for the three flaws – CVE -2018-16864 , CVE -2018-16865 , and CVE -2018-16866 – should appear in distro repos soon as a result of coordinated disclosure .", "event": [{"event_trigger": "appear in", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the three flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Patches", "role": "patch", "argument_pos": []}, {"argument": "CVE -2018-16864", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-16865", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-16866", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "However , Linux distributions such as Debian remain vulnerable at the moment , depending on the version you have installed .", "event": [{"event_trigger": "remain vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Debian", "role": "vulnerable system", "argument_pos": []}, {"argument": "Linux", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "\" They 're aware of the issues and they 're releasing patches , \" said Jimmy Graham , director of product management at Qualys , in a phone interview with The Register .", "event": [{"event_trigger": "aware", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "They", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" I do n't believe Red Hat has released one but it should be coming shortly . \"", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Red Hat", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs were found in systemd - journald , a part of systemd that handles the collection and storage of log data .", "event": [{"event_trigger": "were found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "systemd - journald", "role": "vulnerable system", "argument_pos": []}, {"argument": "systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "handles the collection and storage of log data", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-16864 can be exploited by malware running on a Linux box , or a malicious logged - in user , to crash and potentially hijack the systemd - journald system service , elevating access from user to root .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-16864", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "crash and potentially hijack the systemd - journald system service", "role": "capabilities", "argument_pos": []}, {"argument": "a Linux box", "role": "vulnerable system", "argument_pos": []}, {"argument": "elevating access from user to root", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-16865 and CVE -2018-16866 can be exploited together by a local attacker to crash or hijack the root - privileged journal service .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "crash or hijack the root - privileged journal service", "role": "capabilities", "argument_pos": []}, {"argument": "CVE -2018-16866", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-16865", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Qualys contends all systemd - based Linux distros are vulnerable , though the vulnerabilities can not be exploited in SUSE Linux Enterprise 15 , openSUSE Leap 15.0 , and Fedora 28 and 29 because their user - land code is compiled with GCC 's - fstack - clash - protection option .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "systemd - based Linux distros", "role": "vulnerable system", "argument_pos": []}, {"argument": "Qualys", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The third bug , CVE -2018-16866 , appeared in June 2015 ( systemd v221 ) and , Qualys says , was fixed inadvertently in August 2018 .", "event": [{"event_trigger": "appeared in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The third bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-16866", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "June 2015", "role": "time", "argument_pos": []}, {"argument": "systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "v221", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Qualys", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "In code where the flaw still exists , it could allow an attacker to read out of bounds information , resulting in information leakage .", "event": [{"event_trigger": "exists", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "allow an attacker to read out of bounds information", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Overall , the chip giant patched five vulnerabilities across an array of its products .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the chip giant", "role": "releaser", "argument_pos": []}, {"argument": "five vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "its products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Intel on Tuesday patched three high - severity vulnerabilities that could allow the escalation of privileges across an array of products .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "three high - severity vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "products", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow the escalation of privileges", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Overall , the chip giant fixed five bugs – three rated high - severity , and two medium - severity .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "five bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "the chip giant", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "“ Intel is releasing software updates to mitigate this potential vulnerability , ” it said , urging users to update to version 20.90.0.7 or later of the software .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "version 20.90.0.7 or later", "role": "patch number", "argument_pos": []}, {"argument": "the software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , reported by Thomas Hibbert of Insomnia Security , stems from improper directory permissions plaguing the software ’s ZeroConfig service in versions before 20.90.0.7 .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "versions before 20.90.0.7", "role": "vulnerable system", "argument_pos": []}, {"argument": "the software ’s ZeroConfig service", "role": "vulnerable system", "argument_pos": []}, {"argument": "Insomnia Security", "role": "discoverer", "argument_pos": []}, {"argument": "Thomas Hibbert", "role": "discoverer", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The other high - severity bug exists in the company ’s System Support Utility for Windows , which offers support for Intel - packed Windows device users .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "System Support Utility", "role": "vulnerable system", "argument_pos": []}, {"argument": "The other high - severity bug", "role": "vulnerability", "argument_pos": []}, {"argument": "company", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Versions of System Support Utility for Windows before 2.5.0.15 are impacted ; Intel recommends users update to versions 2.5.0.15 or later .", "event": [{"event_trigger": "recommends", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Independent security researcher Alec Blance was credited with discovering the flaw .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Independent security researcher Alec Blance", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The chip - maker also patched a high - severity and medium - severity flaw in its Software Guard Extensions ( SGX ) platform and software , which help application developers to protect select code and data from disclosure or modification .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The chip - maker", "role": "releaser", "argument_pos": []}, {"argument": "a high - severity and medium - severity flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "its Software Guard Extensions ( SGX ) platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "software", "role": "vulnerable system", "argument_pos": []}, {"argument": "protect select code and data from disclosure or modification", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "“ Multiple potential security vulnerabilities in Intel SGX SDK and Intel SGX Platform Software may allow escalation of privilege or information disclosure , ” said Intel .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Intel SGX SDK", "role": "vulnerable system", "argument_pos": []}, {"argument": "Intel SGX Platform Software", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow escalation of privilege", "role": "capabilities", "argument_pos": []}, {"argument": "Intel", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability is rooted in improper file verification in the install routine for Intel ’s SGX SDK and Platform Software for Windows before 2.2.100 .", "event": [{"event_trigger": "is rooted in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Intel", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "SGX SDK", "role": "vulnerable system", "argument_pos": []}, {"argument": "Platform Software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "before 2.2.100", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "It was discovered by researcher Saif Allah ben Massaoud .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researcher Saif Allah ben Massaoud", "role": "discoverer", "argument_pos": []}, {"argument": "It", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "That ’s due to data leakage in the cryptographic libraries of the SGX platform ’s Integrated Performance Primitives , a function that provides developers with building blocks for image and data processing .", "event": [{"event_trigger": "data leakage", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "cryptographic libraries", "role": "victim", "argument_pos": []}, {"argument": "SGX platform", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "And finally , a medium escalation of privilege vulnerability in Intel ’s SSD data - center tool for Windows has been patched .", "event": [{"event_trigger": "has been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "SSD data - center tool", "role": "vulnerable system", "argument_pos": []}, {"argument": "a medium escalation of privilege vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "“ Improper directory permissions in the installer for the Intel SSD Data Center Tool for Windows before v3 .0.17 may allow authenticated users to potentially enable an escalation of privilege via local access , ” said Intel ’s update .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "discoverer", "argument_pos": []}, {"argument": "enable an escalation of privilege via local access", "role": "capabilities", "argument_pos": []}, {"argument": "before v3 .0.17", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "Intel SSD Data Center Tool", "role": "vulnerable system", "argument_pos": []}, {"argument": "Improper directory permissions", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Intel ’s patch comes during a busy patch Tuesday week , which includes fixes from Adobe and Microsoft .", "event": [{"event_trigger": "comes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has patched two critical flaws in Acrobat and Reader that warrant urgent attention .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "two critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Acrobat and Reader", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Officially , Adobe patches security vulnerabilities around the middle of each month to coordinate with Microsoft ’s Patch Tuesday , but recently it ’s become almost routine for the company to issue out - of - band updates in between .", "event": [{"event_trigger": "patches", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "middle of each month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "APSB19 - 02 , the first of such updates to reach customers in the new year , addresses critical flaws with a priority rating of ‘ 2 ’ .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "APSB19 - 02", "role": "patch number", "argument_pos": []}, {"argument": "new year", "role": "time", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "That means that the flaw is potentially serious , but Adobe has n’t detected any real - world exploits ( the latter would entail issuing an ‘ emergency ’ patch with a ‘ 1 ’ rating ) .", "event": [{"event_trigger": "issuing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "‘ emergency ’ patch", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The first flaw , identified as CVE -2018-16011 , is described by Adobe as a use - after - free bug that could be exploited using a maliciously crafted PDF to take control of a target system with their malware of choice .", "event": [{"event_trigger": "identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-16011", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The first flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The second , CVE -2018-16018 ( replacing CVE -2018-19725 ) , is a security bypass targeting JavaScript API restrictions on Adobe Reader DC and seems to have been in the works since before Christmas , affecting all versions of Window and macOS Acrobat DC / Reader 2019.010.20064 and earlier , the fix in both cases is to update to 2019.010.20069 .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "2019.010.20069", "role": "patch number", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "As critical flaws with a ‘ 2 ’ rating , there is a suggested 30 - day window within which to apply the updates , but it ’s worth bearing in mind that a new round of patches will likely be offered for Adobe products tomorrow as part of Patch Tuesday .", "event": [{"event_trigger": "apply", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "critical flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In December ’s Patch Tuesday , Adobe released a not inconsiderable 87 patches , including 39 rated critical .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "December", "role": "time", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Only days before , Adobe issued an emergency Flash patch for a zero - day vulnerability that was being exploited , while in November Flash received a separate patch for one whose exploitation was believed to be imminent .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "emergency Flash patch", "role": "patch", "argument_pos": []}, {"argument": "zero - day vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "days before", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Criminals are trying to steal money from Netflix customers with a sophisticated new scam .", "event": [{"event_trigger": "a sophisticated new scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "steal money", "role": "purpose", "argument_pos": []}, {"argument": "Criminals", "role": "attacker", "argument_pos": []}, {"argument": "Netflix customers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Subscribers are being sent convincing fake emails asking them to update their payment information .", "event": [{"event_trigger": "are being sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Subscribers", "role": "victim", "argument_pos": []}, {"argument": "convincing fake emails", "role": "tool", "argument_pos": []}, {"argument": "asking them to update their payment information", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "While they look to be from Netflix itself , they are in fact from criminals and scammers .", "event": [{"event_trigger": "look to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Netflix", "role": "trusted entity", "argument_pos": []}, {"argument": "they", "role": "tool", "argument_pos": []}, {"argument": "criminals", "role": "attacker", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "they", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "This link takes you to a fake - designed site to look like Netflix , but in fact is run by scammers .", "event": [{"event_trigger": "look like", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "This link", "role": "tool", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "Netflix", "role": "trusted entity", "argument_pos": []}, {"argument": "a fake - designed site", "role": "tool", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "An urgent warning has been issued about the email by the Federal Trade Commission , a US government agency that told consumers not to \" take the bait \" .", "event": [{"event_trigger": "take the bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "consumers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "\" They also use phishing emails to get access to your computer or network . \"", "event": [{"event_trigger": "use", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "They", "role": "attacker", "argument_pos": []}, {"argument": "phishing emails", "role": "tool", "argument_pos": []}, {"argument": "get access to your computer or network", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "NETFLIX users are once again being warned not to fall for fake emails asking customers to update their payment details .", "event": [{"event_trigger": "fall", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fake emails", "role": "tool", "argument_pos": []}, {"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "update their payment details", "role": "purpose", "argument_pos": []}, {"argument": "NETFLIX users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The emails claim to be from the streaming service but are actually from scammers trying to steal your money .", "event": [{"event_trigger": "claim to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The emails", "role": "tool", "argument_pos": []}, {"argument": "the streaming service", "role": "trusted entity", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "steal your money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "But if you click on it and follow the link , you will be taken to a fake website that is actually run by scammers who may use the information you enter to hack your bank account .", "event": [{"event_trigger": "be taken", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "a fake website", "role": "tool", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "click on it and follow the link", "role": "attack pattern", "argument_pos": []}, {"argument": "hack your bank account", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The Federal Trade Commission , a government agency in the US , has now issued an urgent warning about the Netflix \" phishing scam \" and urged consumers not \" take the bait \" .", "event": [{"event_trigger": "phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Netflix", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "And earlier in 2017 , Netflix users were also hit with a sophisticated ‘ phishing ’ scam inviting them to type in bank details on a fake login page .", "event": [{"event_trigger": "‘ phishing ’ scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Netflix users", "role": "victim", "argument_pos": []}, {"argument": "earlier in 2017", "role": "time", "argument_pos": []}, {"argument": "them", "role": "victim", "argument_pos": []}, {"argument": "type in bank details", "role": "purpose", "argument_pos": []}, {"argument": "a fake login page", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has seen its share of issues as of late , and now a seemingly simple patch is causing serious issues to certain laptops running the 2016 Anniversary Update .", "event": [{"event_trigger": "has seen", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "issues", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "serious issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The update was originally released to prevent a zero - day attack on IE .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "IE", "role": "vulnerable system", "argument_pos": []}, {"argument": "a zero - day attack", "role": "vulnerability", "argument_pos": []}, {"argument": "The update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Per Microsoft , this was the issue being fixed : A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer .", "event": [{"event_trigger": "being fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "An attacker who successfully exploited the vulnerability could gain the same user rights as the current user .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "attacker", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "If the current user is logged on with administrative user rights , an attacker who successfully exploited the vulnerability could take control of an affected system .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "take control of an affected system", "role": "capabilities", "argument_pos": []}, {"argument": "attacker", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In a web - based attack scenario , an attacker could host a specially crafted website that is designed to exploit the vulnerability through Internet Explorer and then convince a user to view the website , for example , by sending an email .", "event": [{"event_trigger": "is designed", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "a specially crafted website", "role": "tool", "argument_pos": []}, {"argument": "an attacker", "role": "attacker", "argument_pos": []}, {"argument": "exploit the vulnerability through Internet Explorer", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The security update addresses the vulnerability by modifying how the scripting engine handles objects in memory .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "The security update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "On the upside , Microsoft is working with Lenovo to correct the issue and will release a fix sometime in the future .", "event": [{"event_trigger": "correct", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Lenovo", "role": "releaser", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A few days ago , Microsoft issued an emergency patch for Internet Explorer to fix a zero - day vulnerability in the web browser .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "an emergency patch", "role": "patch", "argument_pos": []}, {"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}, {"argument": "A few days ago", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The problem affects versions of Internet Explorer from 9 to 11 across multiple versions of Windows , but it seems that the patch has been causing problems for many people .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}, {"argument": "The problem", "role": "vulnerability", "argument_pos": []}, {"argument": "multiple versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "9", "role": "vulnerable system version", "argument_pos": []}, {"argument": "11", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Specifically , people with some Lenovo laptops have found that after installing the KB4467691 patch they are unable to start Windows .", "event": [{"event_trigger": "installing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the KB4467691 patch", "role": "patch", "argument_pos": []}, {"argument": "Lenovo laptops", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "When the patch was released , it was known that there were a few issues with older versions of Windows 10 -- for example , problems with the .", "event": [{"event_trigger": "was released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "But since the initial release , Microsoft has updated the patch page to indicate a further potential problem with some Lenovo laptops : After installing KB4467691 , Windows may fail to startup on certain Lenovo laptops that have less than 8 GB of RAM .", "event": [{"event_trigger": "indicate", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a further potential problem", "role": "vulnerability", "argument_pos": []}, {"argument": "Lenovo laptops", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft says that it is \" working with Lenovo and will provide an update in an upcoming release \" .", "event": [{"event_trigger": "will provide", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "an upcoming release", "role": "patch", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "Lenovo", "role": "releaser", "argument_pos": []}, {"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco Systems this week issued an update for its Adaptive Security Appliance ( ASA ) software , fixing a high - severity vulnerability that could allow authenticated attackers with low - level access to remotely escalate their privileges on Cisco devices with web management access enabled .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco Systems", "role": "releaser", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "its Adaptive Security Appliance ( ASA ) software", "role": "vulnerable system", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The cybersecurity firm Tenable , whose researchers discovered the bug , explained its findings in further detail in a Dec 19 blog post .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "The cybersecurity firm Tenable", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco adds the AAA configuration must be “ accurate and complete ” in order for the software fix to properly take effect .", "event": [{"event_trigger": "adds", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "the software fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "CIsco has issued a critical patch of a patch for a Cisco Prime License Manager SQL fix .", "event": [{"event_trigger": "has issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "CIsco", "role": "releaser", "argument_pos": []}, {"argument": "a critical patch of a patch", "role": "patch", "argument_pos": []}, {"argument": "a Cisco Prime License Manager SQL fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco this week said it patched a “ critical ” patch for its Prime License Manager ( PLM ) software that would let attackers execute random SQL queries .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "a “ critical ” patch", "role": "patch", "argument_pos": []}, {"argument": "its Prime License Manager ( PLM ) software", "role": "vulnerable system", "argument_pos": []}, {"argument": "let attackers execute random SQL queries", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Released in November , the first version of the Prime License Manager patch caused its own “ functional ” problems that Cisco was then forced to fix .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "k3.cop.sgn addressed the SQL vulnerability but caused backup , upgrade and restore problems , and should no longer be used Cisco said .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the SQL vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco wrote that “ customers who have previously installed the ciscocm.CSCvk30822_v1.0 .", "event": [{"event_trigger": "installed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "k3.cop.sgn patch should upgrade to the ciscocm.CSCvk30822_v2.0 .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Installing the v2 .0 patch will first rollback the v1 .0 patch and then install the v2 .0 patch . ”", "event": [{"event_trigger": "Installing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the v2 .0 patch", "role": "patch number", "argument_pos": []}, {"argument": "the v1 .0 patch", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability impacts Cisco Prime License Manager Releases 11.0.1 and later .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco Prime License Manager", "role": "vulnerable system", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Releases 11.0.1 and later", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft today released an emergency software patch to plug a critical security hole in its Internet Explorer ( IE ) Web browser that attackers are already using to break into Windows computers .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "an emergency software patch", "role": "patch", "argument_pos": []}, {"argument": "today", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The software giant said it learned about the weakness ( CVE -2018-8653 ) after receiving a report from Google about a new vulnerability being used in targeted attacks .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The software giant", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Satnam Narang , senior research engineer at Tenable , said the vulnerability affects the following installations of IE : Internet Explorer 11 from Windows 7 to Windows 10 as well as Windows Server 2012 , 2016 and 2019 ; IE 9 on Windows Server 2008 ; and IE 10 on Windows Server 2012 .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Satnam Narang", "role": "discoverer", "argument_pos": []}, {"argument": "senior research engineer", "role": "discoverer", "argument_pos": []}, {"argument": "Tenable", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "“ As the flaw is being actively exploited in the wild , users are urged to update their systems as soon as possible to reduce the risk of compromise , ” Narang said .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft says users who have Windows Update enabled and have applied the latest security updates are protected automatically .", "event": [{"event_trigger": "have applied", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest security updates", "role": "patch", "argument_pos": []}, {"argument": "Windows Update", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has issued an emergency , out - of - band patch for an Internet Explorer zero - day that was being actively exploited in targeted attacks .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "an Internet Explorer zero - day", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-8653 affects a range of versions of Internet Explorer from 9 to 11 , across Windows 7 to 10 and Windows Server .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-8653", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows 7", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows Server", "role": "vulnerable system", "argument_pos": []}, {"argument": "9", "role": "vulnerable system version", "argument_pos": []}, {"argument": "11", "role": "vulnerable system version", "argument_pos": []}, {"argument": "10", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability amounts to a remote code execution exploit , and it was first spotted by Google 's Threat Analysis Group .", "event": [{"event_trigger": "was first spotted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Google 's Threat Analysis Group", "role": "discoverer", "argument_pos": []}, {"argument": "remote code execution exploit", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft explains that a problem with Internet Explorer 's scripting engine could be exploited by an attacker to execute arbitrary code on a victim 's computer .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "execute arbitrary code", "role": "capabilities", "argument_pos": []}, {"argument": "computer", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "In a short security advisory , the company says : Today , we released a security update for Internet Explorer after receiving a report from Google about a new vulnerability being used in targeted attacks .", "event": [{"event_trigger": "receiving a report", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Google", "role": "discoverer", "argument_pos": []}, {"argument": "a new vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Customers who have Windows Update enabled and have applied the latest security updates , are protected automatically .", "event": [{"event_trigger": "have applied", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest security updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In a more detailed security vulnerability posting , Microsoft explains the impact of the problem : A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A remote code execution vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Troubled browser has once again come under attack , with flaw discovered in multiple versions of Internet Explorer .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}, {"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "multiple versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has been forced to issue an emergency security patch for its Internet Explorer browser .", "event": [{"event_trigger": "issue", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "its Internet Explorer browser", "role": "vulnerable system", "argument_pos": []}, {"argument": "an emergency security patch", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The release came after Google security engineer Clement Lecigne uncovered a critical vulnerability in several versions of Microsoft 's browser , and could have been activated simply by directing users to a malicious website The flaw , known as CVE -2018-8653 , affects Internet Explorer 9 , 10 and 11 , with the update issued to Windows 7 , 8.1 and 10 versions , as well as Windows Server 2008 , 2012 , 2016 and 2019 .", "event": [{"event_trigger": "uncovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Google security engineer Clement Lecigne", "role": "discoverer", "argument_pos": []}, {"argument": "directing users to a malicious website", "role": "capabilities", "argument_pos": []}, {"argument": "browser", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "several versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "\" A remote code execution vulnerability exists in the way that the scripting engine handles objects in memory in Internet Explorer , \" Microsoft stated in its support document for the threat .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A remote code execution vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The company has issued a fix for the flaw now , outside of its typical Patch Tuesday security cycle , signifying it is a significant threat and should be patched immediately .", "event": [{"event_trigger": "has issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The company", "role": "issues addressed", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "When it comes to fixing security vulnerabilities , it should be clear by now that words only count when they ’re swiftly followed by actions .", "event": [{"event_trigger": "fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Ask peripherals maker Logitech , which last week became the latest company to find itself on the receiving end of an embarrassing public flaw disclosure by Google ’s Project Zero team .", "event": [{"event_trigger": "disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Project Zero team", "role": "discoverer", "argument_pos": []}, {"argument": "an embarrassing public flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Google", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Pretty quickly , he noticed some problems with the application ’s design , starting with the fact that it … opens a websocket server on port 10134 that any website can connect to , and has no origin checking at all .", "event": [{"event_trigger": "noticed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "problems", "role": "vulnerability", "argument_pos": []}, {"argument": "application", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Ormandy claimed this might offer attackers a way of executing keystroke injection to take control of a Windows PC running the software .", "event": [{"event_trigger": "claimed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Ormandy", "role": "discoverer", "argument_pos": []}, {"argument": "take control of a Windows PC running the software", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Within days of contacting Logitech , Ormandy says he had a meeting to discuss the vulnerability with its engineers on 18 September , who assured him they understood the problem .", "event": [{"event_trigger": "discuss", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "its engineers", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Ormandy", "role": "discoverer", "argument_pos": []}, {"argument": "Logitech", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "18 September", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "A new version of Options appeared on 1 October without a fix , although in fairness to Logitech that was probably too soon for any patch for Ormandy ’s vulnerability to be included .", "event": [{"event_trigger": "appeared", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "1 October", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "As anyone who ’s followed Google ’s Project Zero will know , it operates a strict 90 - day deadline for a company to fix vulnerabilities disclosed to it , after which they are made public .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "I would recommend disabling Logitech Options until an update is available .", "event": [{"event_trigger": "is available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "Logitech Options", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Clearly , the disclosure got things moving – on 13 December , Logitech suddenly updated Options to version 7.00.564 ( 7.00.554 for Mac ) .", "event": [{"event_trigger": "updated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "version 7.00.564", "role": "patch number", "argument_pos": []}, {"argument": "7.00.554", "role": "patch number", "argument_pos": []}, {"argument": "Logitech", "role": "releaser", "argument_pos": []}, {"argument": "13 December", "role": "time", "argument_pos": []}, {"argument": "Options", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mac", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "The company also tweeted that the flaws had been fixed , confirmed by Ormandy on the same day .", "event": [{"event_trigger": "had been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "The company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Earlier in 2018 , Microsoft ran into a similar issue over a vulnerability found by Project Zero in the Edge browser .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Earlier in 2018", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "a similar issue", "role": "vulnerability", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Project Zero", "role": "discoverer", "argument_pos": []}, {"argument": "the Edge browser", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Times have changed – vendors have to move from learning about a bug to releasing a fix much more rapidly than they used to .", "event": [{"event_trigger": "releasing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "vendors", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "This app contained a huge security flaw that was discovered by Tavis Ormandy who is a Google security researcher .", "event": [{"event_trigger": "contained", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a huge security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "This app", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "It was found that Logitech Options was opening a WebSocket server on each individual computer Logitech Options was run on .", "event": [{"event_trigger": "was found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Logitech Options", "role": "vulnerable system", "argument_pos": []}, {"argument": "It", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "After Ormandy got a hold of Logitech ’s engineers , he reported the vulnerability privately to them in a meeting between the Logitech ’s engineering team and Ormandy on the 18th of September .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "Ormandy", "role": "discoverer", "argument_pos": []}, {"argument": "engineers", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "them", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the 18th of September", "role": "time", "argument_pos": []}, {"argument": "Ormandy", "role": "discoverer", "argument_pos": []}, {"argument": "Logitech", "role": "discoverer", "argument_pos": []}, {"argument": "engineering team", "role": "discoverer", "argument_pos": []}, {"argument": "Logitech", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "After waiting a total of 90 days , Ormandy saw the company ’s failure in addressing the issue publicly or through a patch for the app , Thus Ormandy himself posted his finding on the 11th of December making the issue public .", "event": [{"event_trigger": "posted his finding", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "the 11th of December", "role": "time", "argument_pos": []}, {"argument": "Ormandy", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Logitech released Options version 7.00.564 on the 13th of December .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Options version 7.00.564", "role": "patch number", "argument_pos": []}, {"argument": "the 13th of December", "role": "time", "argument_pos": []}, {"argument": "Logitech", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "They claim to have fixed the origin and type checking bugs along with a patch for the security vulnerability .", "event": [{"event_trigger": "have fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "the security vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "They", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "However they have not mentioned the Security Vulnerability patch on their own website .", "event": [{"event_trigger": "have not mentioned", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Security Vulnerability patch", "role": "patch", "argument_pos": []}, {"argument": "they", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "They told German magazine heise.de that the new version does indeed fix the vulnerability Travis Ormandy and his team are currently checking the new version of Logitech Options for any signs of Security Vulnerabilities .", "event": [{"event_trigger": "does indeed fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the new version", "role": "patch number", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Everyone with the old version of Logitech Options are advised to upgrade to the new 7.00.564 .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the new 7.00.564", "role": "patch number", "argument_pos": []}, {"argument": "Logitech Options", "role": "vulnerable system", "argument_pos": []}, {"argument": "old version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Thousands , if not more , Jenkins servers are vulnerable to data theft , takeover , and cryptocurrency mining attacks .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "data theft", "role": "capabilities", "argument_pos": []}, {"argument": "takeover", "role": "capabilities", "argument_pos": []}, {"argument": "cryptocurrency mining attacks", "role": "capabilities", "argument_pos": []}, {"argument": "Jenkins servers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Both vulnerabilities were discovered by security researchers from CyberArk , were privately reported to the Jenkins team , and received fixes over the summer .", "event": [{"event_trigger": "were discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Both vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "security researchers", "role": "discoverer", "argument_pos": []}, {"argument": "CyberArk", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "But despite patches for both issues , there are still thousands of Jenkins servers available online .", "event": [{"event_trigger": "available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Jenkins servers", "role": "vulnerable system", "argument_pos": []}, {"argument": "both issues", "role": "vulnerability", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Over the summer , CyberArk researchers discovered a vulnerability ( tracked as CVE -2018-1999001 ) that allows an attacker to provide malformed login credentials that cause Jenkins servers to move their config.xml file from the Jenkins home directory to another location .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CyberArk researchers", "role": "discoverer", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "allows an attacker to provide malformed login credentials", "role": "capabilities", "argument_pos": []}, {"argument": "summer", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "This lone issue would have been quite bad on its own , but CyberArk researchers also discovered a second Jenkins vulnerability -- CVE -2018-1999043 .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CyberArk researchers", "role": "discoverer", "argument_pos": []}, {"argument": "a second Jenkins vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-1999043", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "This second bug , they said , allowed an attacker to create ephemeral user records in the server 's memory , allowing an attacker a short period when they could authenticate using ghost usernames and credentials .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "discoverer", "argument_pos": []}, {"argument": "allowed an attacker to create ephemeral user records", "role": "capabilities", "argument_pos": []}, {"argument": "authenticate using ghost usernames and credentials", "role": "capabilities", "argument_pos": []}, {"argument": "This second bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Both vulnerabilities were fixed , the first in July and the second in August , but as we 've gotten accustomed to in the past few years of covering security flaws , not all server owners have bothered to install these security updates .", "event": [{"event_trigger": "were fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Both vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "July", "role": "time", "argument_pos": []}, {"argument": "August", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has patched a number of security vulnerabilities on the last scheduled monthly update of this year .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "a number of security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the last scheduled monthly update", "role": "patch", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "All these patches specifically addressed bugs in Adobe Reader and Acrobat .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these patches", "role": "patch", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Allegedly , Adobe December Patch Tuesday Update fixed as much as 86 different vulnerabilities , including 38 critical security flaws .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "86 different vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "38 critical security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This week , Adobe rolled out the last scheduled monthly updates for its products .", "event": [{"event_trigger": "rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "This week", "role": "time", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "its products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As much as 38 different critical security bugs received patches with this update .", "event": [{"event_trigger": "received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "38 different critical security bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "this update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In addition , 3 security bypass vulnerabilities also received fixes with this update .", "event": [{"event_trigger": "received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "3 security bypass vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "this update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to the above , Adobe also released fixes for 48 important security vulnerabilities .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "48 important security vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has patched all 86 vulnerabilities in the recently released versions of the respective software .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "86 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the recently released versions", "role": "patch", "argument_pos": []}, {"argument": "the respective software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Users of both Windows and MacOS should , therefore , ensure updating their systems and download the latest versions of the affected software to stay protected from these vulnerabilities .", "event": [{"event_trigger": "updating", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the affected software", "role": "vulnerable system", "argument_pos": []}, {"argument": "these vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the latest versions", "role": "patch number", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "MacOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "This month ’s scheduled update bundle did not address any security flaws in Flash Player .", "event": [{"event_trigger": "did not address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "This month ’s scheduled update bundle", "role": "patch", "argument_pos": []}, {"argument": "security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Nonetheless , lately , Adobe already patched a critical Flash vulnerability already disclosed to the public .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical Flash vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "lately", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Speaking to the Boston Globe , the US arm of the non-profit , which supports children worldwide , said that con artists managed to compromise an employee 's email account in order to masquerade as the staff member in question .", "event": [{"event_trigger": "compromise", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "con artists", "role": "attacker", "argument_pos": []}, {"argument": "employee", "role": "victim", "argument_pos": []}, {"argument": "email account", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Once access was gained to the account , the hackers behind the scam created a number of false invoices and related documents which described a need to purchase solar panels for health centers located in Pakistan .", "event": [{"event_trigger": "access was gained", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "account", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The Connecticut - based charity organization fell for the ruse , conducted in May 2017 , and approved the transfer of close to $ 1 million to an entity in Japan which was used as a front to rake in the proceeds .", "event": [{"event_trigger": "ruse", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Connecticut - based charity organization", "role": "victim", "argument_pos": []}, {"argument": "May 2017", "role": "time", "argument_pos": []}, {"argument": "$ 1 million", "role": "damage amount", "argument_pos": []}, {"argument": "approved the transfer", "role": "purpose", "argument_pos": []}, {"argument": "Japan", "role": "place", "argument_pos": []}, {"argument": "entity", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The scammers targeting the charity appeared to follow the rules of Business Email Compromise ( BEC ) attacks almost to the letter .", "event": [{"event_trigger": "Business Email Compromise ( BEC ) attacks", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "charity", "role": "victim", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "These campaigns have a number of steps , compromise a business email account via brute - force hacking or social engineering ; pretend to be a legitimate staff member , and lure another individual to approve false invoices or fraudulent payments .", "event": [{"event_trigger": "pretend to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "legitimate staff member", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The FBI has previously warned that December 2016 and May 2018 , there was a 136 percent increase in BEC scams , reported across 150 countries , Ill - gotten funds are often sent to entities in Asia and billions of dollars have been lost .", "event": [{"event_trigger": "BEC scams", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "December 2016 and May 2018", "role": "time", "argument_pos": []}, {"argument": "Asia", "role": "place", "argument_pos": []}, {"argument": "billions of dollars", "role": "damage amount", "argument_pos": []}, {"argument": "entities", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "In February , IBM said a single BEC scam originating in Nigeria led to the loss of millions of dollars belonging to Fortune 500 companies .", "event": [{"event_trigger": "single BEC scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Nigeria", "role": "place", "argument_pos": []}, {"argument": "millions of dollars", "role": "damage amount", "argument_pos": []}, {"argument": "Fortune 500 companies", "role": "victim", "argument_pos": []}, {"argument": "February", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "In September , a man from Nigeria was ordered to pay $ 2.5 million and serve five years in prison for conducting a variety of BEC scams against enterprise companies .", "event": [{"event_trigger": "BEC scams", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "enterprise companies", "role": "victim", "argument_pos": []}, {"argument": "Nigeria", "role": "place", "argument_pos": []}, {"argument": "man", "role": "attacker", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "WordPress 5.0 users are being urged to update their CMS software to fix a number of serious bugs .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their CMS software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The update ( WordPress 5.0.1 ) addresses seven flaws and was issued Thursday , less than a week after WordPress 5.0 was released .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "5.0.1", "role": "patch number", "argument_pos": []}, {"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "seven flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "WordPress", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Wordfence said all WordPress users running versions of the 4.x branch of WordPress core are also impacted by similar issues .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Wordfence", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "It urges those 4.x users , not ready to update to the 5.0 branch , to install the WordPress 4.9.9 security update ( also released this week ) , which addresses similar bugs .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "similar bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Three of the bugs fixed with the release of WordPress 5.0.1 are cross-site scripting ( XSS ) vulnerabilities .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Three of the bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "the release", "role": "patch", "argument_pos": []}, {"argument": "5.0.1", "role": "patch number", "argument_pos": []}, {"argument": "cross-site scripting ( XSS ) vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "WordPress", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "WordPress addressed this issue by removing the tag from their HTML whitelist . ”", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "WordPress", "role": "vulnerable system", "argument_pos": []}, {"argument": "this issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "WordPress plugins are potentially impacted by a third XSS bug that opens up sites to attacks launched by adversaries who send specially crafted URLs to affected sites .", "event": [{"event_trigger": "are potentially impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a third XSS bug", "role": "vulnerability", "argument_pos": []}, {"argument": "WordPress plugins", "role": "vulnerable system", "argument_pos": []}, {"argument": "opens up sites to attacks launched by adversaries", "role": "capabilities", "argument_pos": []}, {"argument": "send specially crafted URLs to affected sites", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "According to researchers , the bug does n’t impact WordPress 5.0 directly , rather the “ wpmu_admin_do_redirect ” function used by some WordPress plugins .", "event": [{"event_trigger": "does n’t impact", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "WordPress", "role": "vulnerable system", "argument_pos": []}, {"argument": "5.0", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "A PHP ( Hypertext Preprocessor ) bug was also identified by WordPress .", "event": [{"event_trigger": "was also identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A PHP ( Hypertext Preprocessor ) bug", "role": "vulnerability", "argument_pos": []}, {"argument": "WordPress", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "This bug is more technical in nature and was found by Sam Thomas , of Secarma Labs , who publicly disclosed it at the 2018 Black Hat conference .", "event": [{"event_trigger": "publicly disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Virgin Media has – perhaps rather belatedly – fixed a series of vulnerabilities in its Super Hub 3.0 home broadband router modem , after they were reported more than 18 months ago .", "event": [{"event_trigger": "were reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "vulnerability", "argument_pos": []}, {"argument": "18 months ago", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Balazs Bucsay , managing security consultant at NCC Group , says that after receiving one of the devices as a home customer and examining it for a few hours , he was quickly able to find a remote command execution bug .", "event": [{"event_trigger": "find", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a remote command execution bug", "role": "vulnerability", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "Balazs Bucsay", "role": "discoverer", "argument_pos": []}, {"argument": "NCC Group", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "“ After hacking into my own Super Hub 3.0 , I was able to find multiple security flaws within the router ’s firmware and combine these to create an exploit that could have been hidden within webpages and sent to other unsuspecting owners via scam emails or other methods , ” Bucsay tells The Daily Swig .", "event": [{"event_trigger": "find", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "multiple security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "I", "role": "discoverer", "argument_pos": []}, {"argument": "Super Hub 3.0", "role": "vulnerable system", "argument_pos": []}, {"argument": "firmware", "role": "vulnerable system", "argument_pos": []}, {"argument": "router", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Bucsay reported the vulnerabilities to Virgin Media in March 2017 , but says they were n't fixed until the end of July this year .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Bucsay", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Virgin Media", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "March 2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "“ The online security of our customers is a top priority for Virgin Media and the issues described by NCC have been fixed , ” she told The Daily Swig .", "event": [{"event_trigger": "described", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "NCC", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "With the patch rolled out in August , Super Hub 3.0 users do n’t need to do anything extra to protect themselves .", "event": [{"event_trigger": "rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "August", "role": "time", "argument_pos": []}, {"argument": "the patch", "role": "patch", "argument_pos": []}, {"argument": "Super Hub 3.0", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "11th December was Microsoft ’s December 2018 Patch Tuesday , which means users had to update their computers to be protected from the latest threats to Windows and Microsoft products .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "11th December", "role": "time", "argument_pos": []}, {"argument": "their computers", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has fixed 39 vulnerabilities , with 10 of them being labeled as Critical .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "39 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Keeping up with its December 2018 Patch Tuesday , Microsoft announced on its blog that a vulnerability exists in Windows Domain Name System ( DNS ) .", "event": [{"event_trigger": "announced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "discoverer", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "There was not much information provided to the customers about how and when this vulnerability was discovered .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The following details were released by Microsoft : The Exploit Microsoft Windows is prone to a heap - based buffer - overflow vulnerability .", "event": [{"event_trigger": "is prone", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "a heap - based buffer - overflow vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A remote code execution vulnerability exists in Windows Domain Name System ( DNS ) servers when they fail to properly handle requests .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows Domain Name System ( DNS ) servers", "role": "vulnerable system", "argument_pos": []}, {"argument": "A remote code execution vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "An attacker who successfully exploits this issue may execute arbitrary code within the context of the affected application .", "event": [{"event_trigger": "exploits", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "issue", "role": "vulnerability", "argument_pos": []}, {"argument": "execute arbitrary code", "role": "capabilities", "argument_pos": []}, {"argument": "application", "role": "vulnerable system", "argument_pos": []}, {"argument": "attacker", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The company has also provided users with security updates for the affected systems .", "event": [{"event_trigger": "has also provided", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security updates", "role": "patch", "argument_pos": []}, {"argument": "the affected systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "The company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "“ To clarify , the vulnerability we addressed had nothing to do with arbitrary code execution , but was rather an issue discovered by the Jenkins security team that allowed a small subset of existing Jenkins code to be invoked by a remote client , ” Daniel Beck , Jenkins security officer , told The Daily Swig in an email .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "arbitrary code execution", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The advisory reads : “ Given the vast potential attack surface , we fully expect other attacks , that we are not currently aware of , to be possible on Jenkins releases that do not have this fix applied .", "event": [{"event_trigger": "applied", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fix", "role": "patch", "argument_pos": []}, {"argument": "Jenkins", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "“ This is reflected in the high score we assigned to this issue , rather than limiting the score to the impact through known issues . ”", "event": [{"event_trigger": "assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this issue", "role": "vulnerability", "argument_pos": []}, {"argument": "we", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In this case , we released updates for two LTS lines simultaneously for the first time , so admins could apply the update without having to go through a major version jump .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "two LTS lines", "role": "patch", "argument_pos": []}, {"argument": "we", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "“ We strive to fix all security vulnerabilities in Jenkins and plugins in a timely manner . ”", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}, {"argument": "Jenkins", "role": "vulnerable system", "argument_pos": []}, {"argument": "plugins", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Struts has suffered a number of serious security flaws in recent years .", "event": [{"event_trigger": "has suffered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "recent years", "role": "time", "argument_pos": []}, {"argument": "serious security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Struts", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In 2017 , a vulnerability in the framework was exploited to expose the details of up to 148 million Equifax customers .", "event": [{"event_trigger": "was exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "framework", "role": "vulnerable system", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Another flaw , revealed in August 2018 , could lead to remote code execution .", "event": [{"event_trigger": "revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Another flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "August 2018", "role": "time", "argument_pos": []}, {"argument": "lead to remote code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "They ’ve been in the limelight this year with hardware vulnerabilities exposed , known as Spectre and Meltdown .", "event": [{"event_trigger": "exposed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Spectre", "role": "vulnerability", "argument_pos": []}, {"argument": "Meltdown", "role": "vulnerability", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "hardware", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The new designs have of course been patched against those weaknesses .", "event": [{"event_trigger": "been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The new designs", "role": "vulnerable system", "argument_pos": []}, {"argument": "those weaknesses", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has patched 87 vulnerabilities for Acrobat and Reader in its December Patch Tuesday update , including a slew of critical flaws that would allow arbitrary code - execution .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "87 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Acrobat and Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "allow arbitrary code - execution", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The scheduled update comes less than a week after Adobe released several out - of - band fixes for Flash Player , including a critical vulnerability ( CVE -2018-15982 ) that it said is being exploited in the wild .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a week after", "role": "time", "argument_pos": []}, {"argument": "The scheduled update", "role": "patch", "argument_pos": []}, {"argument": "several out - of - band fixes", "role": "patch", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "a critical vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15982", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe also patched three other critical - rated issues that could lead to privilege escalation ; these are all security bypass problems .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "three other critical - rated issues", "role": "vulnerability", "argument_pos": []}, {"argument": "lead to privilege escalation", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to the critical bugs , Adobe also patched 43 out - of - bounds read flaws , four integer overflow problems and two security bypass issues , all of which could allow information disclosure .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the critical bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "43 out - of - bounds read flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "four integer overflow problems", "role": "vulnerability", "argument_pos": []}, {"argument": "two security bypass issues", "role": "vulnerability", "argument_pos": []}, {"argument": "allow information disclosure", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has characterized all of the flaws , both critical and important , as “ priority two ” for patching , which means that the software giant deems them to be unlikely to be imminently exploited in the wild , but patching within 30 days is recommended .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the software giant", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The flaws are far - reaching and affect various implementations of Acrobat DC , Acrobat Reader DC , Acrobat 2017 and Acrobat Reader 2017 for macOS and Windows , in classic 2015 , classic 2017 and continuous - track versions .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Acrobat DC", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat Reader DC", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat 2017", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat Reader 2017", "role": "vulnerable system", "argument_pos": []}, {"argument": "classic 2015", "role": "vulnerable system version", "argument_pos": []}, {"argument": "classic 2017", "role": "vulnerable system version", "argument_pos": []}, {"argument": "continuous - track versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "All can be mitigated by updating to the most current versions of the software .", "event": [{"event_trigger": "mitigated by updating", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "current versions", "role": "patch number", "argument_pos": []}, {"argument": "the software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The city of North Bend , Ore. , was hit with a ransomware attack which temporarily locked out city workers from their computers and databases .", "event": [{"event_trigger": "was hit with a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The city of North Bend", "role": "victim", "argument_pos": []}, {"argument": "locked out city workers from their computers and databases", "role": "attack pattern", "argument_pos": []}, {"argument": "Ore.", "role": "place", "argument_pos": []}]}], "task": "EE"} {"text": "“ One weekend morning a few weeks back all of our servers and things locked up , and we received a ransomware note that asked for $ 50,000 in Bitcoin these people would provide us with the code to unlock our computer systems , ” North Bend City Administrator Terence O’Connor told The World .", "event": [{"event_trigger": "asked for", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "a ransomware note", "role": "tool", "argument_pos": []}, {"argument": "we", "role": "victim", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "locked up", "role": "attack pattern", "argument_pos": []}, {"argument": "$ 50,000", "role": "price", "argument_pos": []}, {"argument": "in Bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "One weekend morning a few weeks", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Fortunately the city ’s IT systems were backed up and officials were able to avoid the high ransom demanded by the criminals responsible for the attack .", "event": [{"event_trigger": "the high ransom demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the criminals", "role": "attacker", "argument_pos": []}, {"argument": "officials", "role": "victim", "argument_pos": []}, {"argument": "IT systems", "role": "victim", "argument_pos": []}, {"argument": "the city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "City officials did , however , call in the FBI to investigate the attack and while they were unable to identify anyone directly involved in the attack , they were able to trace the ransom demand to Romania .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The city was insured and ended up having to pay around $ 5,000 in out of pocket expenses as well as added a firewall security to prevent future attacks .", "event": [{"event_trigger": "having to pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 5,000", "role": "price", "argument_pos": []}, {"argument": "The city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Kubernetes has12 become the most popular cloud container orchestration system by far , so it was only a matter of time until its first major security hole was discovered .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "its first major security hole", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Not only can this actor steal sensitive data or inject malicious code , but they can also bring down production applications and services from within an organization 's firewall .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "sensitive data", "role": "compromised data", "argument_pos": []}, {"argument": "this actor", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "\" The only real fix is to upgrade Kubernetes .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The only real fix", "role": "patch", "argument_pos": []}, {"argument": "Kubernetes", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Kubernetes distributors are already releasing fixes .", "event": [{"event_trigger": "are already releasing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "Kubernetes distributors", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Red Hat has begun delivering patches and service updates to affected users .", "event": [{"event_trigger": "delivering", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Red Hat", "role": "releaser", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "service updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Darren Shepard , chief architect and co-founder at Rancher Labs , discovered the bug and reported it using the Kubernetes vulnerability reporting process .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Darren Shepard", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Two Iranian men already indicted in New Jersey in connection with a broad cybercrime and extortion scheme targeting government agencies , cities and businesses now face new federal charges in Georgia related to a ransomware attack that caused havoc for the city of Atlanta earlier this year .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "earlier this year", "role": "time", "argument_pos": []}, {"argument": "the city of Atlanta", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The Atlanta indictment accuses the two men of launching a ransomware attack against Atlanta that encrypted vital city computer systems .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "encrypted vital city computer systems", "role": "attack pattern", "argument_pos": []}, {"argument": "Atlanta", "role": "victim", "argument_pos": []}, {"argument": "the two men", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In the Atlanta attack , a ransomware known as SamSam was used to infect about 3,789 computers belonging to the city , prosecutors said .", "event": [{"event_trigger": "the Atlanta attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "a ransomware", "role": "tool", "argument_pos": []}, {"argument": "used to infect", "role": "attack pattern", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}, {"argument": "the city", "role": "victim", "argument_pos": []}, {"argument": "SamSam", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The ransomware encrypted the files on the computers and showed a ransom note demanding payment for a decryption key .", "event": [{"event_trigger": "demanding payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "showed a ransom note", "role": "attack pattern", "argument_pos": []}, {"argument": "the computers", "role": "victim", "argument_pos": []}, {"argument": "encrypted the files", "role": "attack pattern", "argument_pos": []}, {"argument": "The ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The note demanded 0.8 bitcoin per affected computer or six bitcoin to decrypt all affected computers .", "event": [{"event_trigger": "demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The note", "role": "tool", "argument_pos": []}, {"argument": "0.8 bitcoin", "role": "price", "argument_pos": []}, {"argument": "computer", "role": "victim", "argument_pos": []}, {"argument": "six bitcoin", "role": "price", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Atlanta Mayor Keisha Lance Bottoms said in the days after the ransomware attack that the ransom demand was equivalent to $ 51,000 .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 51,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "The ransom note provided a bitcoin address to pay the ransom and a website accessible only on the dark web , where it said the city could retrieve the decryption key , prosecutors said .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "a bitcoin address", "role": "payment method", "argument_pos": []}, {"argument": "The ransom note", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The decryption key became inaccessible shortly after the attack , and the city did n’t pay the ransom , prosecutors said .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The US Attorney 's Office for the District of Northern Georgia announced Wednesday that a federal grand jury had returned indictments against two Iranian nationals charged with executing the March 2018 ransomware attack that paralyzed Atlanta city government services for over a week .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "over a week", "role": "time", "argument_pos": []}, {"argument": "March 2018", "role": "time", "argument_pos": []}, {"argument": "Atlanta city government", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Faramarz Shahi Savandi and Mohammed Mehdi Shah Mansouri are accused of using the Samsam ransomware to encrypt files on 3,789 City of Atlanta computers , including servers and workstations , in an attempt to extort Bitcoin from Atlanta officials .", "event": [{"event_trigger": "extort", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Atlanta officials", "role": "victim", "argument_pos": []}, {"argument": "Bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "workstations", "role": "victim", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}, {"argument": "encrypt files", "role": "attack pattern", "argument_pos": []}, {"argument": "Faramarz Shahi Savandi", "role": "attacker", "argument_pos": []}, {"argument": "Mohammed Mehdi Shah Mansouri", "role": "attacker", "argument_pos": []}, {"argument": "City of Atlanta", "role": "victim", "argument_pos": []}, {"argument": "the Samsam ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Details leaked by City of Atlanta employees during the ransomware attack , including screenshots of the demand message posted on city computers , indicated that Samsam - based malware was used .", "event": [{"event_trigger": "the ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Samsam - based malware was used", "role": "attack pattern", "argument_pos": []}, {"argument": "the demand message", "role": "tool", "argument_pos": []}, {"argument": "city computers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A Samsam variant was used in a number of ransomware attacks on hospitals in 2016 , with attackers using vulnerable Java Web services to gain entry in several cases .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "2016", "role": "time", "argument_pos": []}, {"argument": "hospitals", "role": "victim", "argument_pos": []}, {"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "using vulnerable Java Web services", "role": "attack pattern", "argument_pos": []}, {"argument": "A Samsam variant", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "According to the indictment , the attackers offered the city the option of paying six Bitcoin ( currently the equivalent of $ 22,500 ) to get keys to unlock all the affected systems or 0.8 Bitcoin ( about $ 3,000 ) for individual systems .", "event": [{"event_trigger": "offered", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "the city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "\" The ransom note directed the City of Atlanta to a particular Bitcoin address to pay the ransom and supplied a web domain that was only accessible using a Tor browser , \" a Department of Justice spokesperson said in a statement .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "a particular Bitcoin address", "role": "payment method", "argument_pos": []}, {"argument": "the City of Atlanta", "role": "victim", "argument_pos": []}, {"argument": "The ransom note", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "But within days of the attack , the Tor page became unreachable , and the City of Atlanta did not pay the ransom .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "City of Atlanta", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "They are also charged in a separate indictment in the US District Court for the District of New Jersey in connection with another ransomware attack , in which a ransom was apparently paid .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Adobe on Wednesday released several unscheduled fixes for Flash Player , including a critical vulnerability that it said is being exploited in the wild .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "Wednesday", "role": "time", "argument_pos": []}, {"argument": "several unscheduled fixes", "role": "patch", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "a critical vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "“ Adobe has released security updates for Adobe Flash Player for Windows , macOS , Linux and Chrome OS , ” Adobe said in its release .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "security updates", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "Chrome OS", "role": "supported platform", "argument_pos": []}, {"argument": "Linux", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "“ These updates address one critical vulnerability in Adobe Flash Player and one important vulnerability in Adobe Flash Player installer .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "These updates", "role": "patch", "argument_pos": []}, {"argument": "one critical vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "one important vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Flash Player installer", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw was discovered by Chenming Xu and Ed Miles of Gigamon ATR .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Chenming Xu", "role": "discoverer", "argument_pos": []}, {"argument": "Ed Miles", "role": "discoverer", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Gigamon ATR", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers also outlined the further technical details about the exploit of the vulnerability .", "event": [{"event_trigger": "outlined", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the exploit", "role": "vulnerability", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Impacted is Adobe Flash Player Desktop Runtime , Adobe Flash Player for Google Chrome ; Adobe Flash Player for Microsoft Edge and Internet Explorer 11 ; all for versions 31.0.0.153 and earlier .", "event": [{"event_trigger": "Impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Flash Player Desktop Runtime", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "all for versions 31.0.0.153 and earlier", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Internet Explorer 11", "role": "vulnerable system", "argument_pos": []}, {"argument": "Google Chrome", "role": "supported platform", "argument_pos": []}, {"argument": "Microsoft Edge", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe Flash Player Installer versions 31.0.0.108 and earlier is also affected .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Flash Player Installer", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 31.0.0.108", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Users of these impacted products can update to version 32.0.0.101 , according to Adobe .", "event": [{"event_trigger": "can update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "version 32.0.0.101", "role": "patch number", "argument_pos": []}, {"argument": "these impacted products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Users of Adobe Flash Player Installer can update to version 31.0.0.122 .", "event": [{"event_trigger": "can update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Flash Player Installer", "role": "vulnerable system", "argument_pos": []}, {"argument": "version 31.0.0.122", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe also patched an important - rated insecure library loading ( via DLL hijacking ) vulnerability , CVE -2018-15983 , that could lead to privilege escalation via Adobe Flash .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Flash", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15983", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "lead to privilege escalation", "role": "issues addressed", "argument_pos": []}, {"argument": "important - rated insecure library loading", "role": "vulnerability", "argument_pos": []}, {"argument": "DLL hijacking", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "This is only the latest exploit to hit Adobe Flash – earlier in June , a zero - day Flash vulnerability was is being exploited in the wild in targeted attacks against Windows users in the Middle East , according to researchers .", "event": [{"event_trigger": "being exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "zero - day Flash vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Flash", "role": "vulnerable system", "argument_pos": []}, {"argument": "latest exploit", "role": "vulnerability", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe dealt with another zero - day Flash vulnerability back in February , which was exploited by North Korean hackers .", "event": [{"event_trigger": "was exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "February", "role": "time", "argument_pos": []}, {"argument": "zero - day Flash vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The security bug was discovered by Darren Shepherd , co-founder of Rancher Labs company that provides the Kubernetes - as - a-Service solution called Rancher .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Darren Shepherd", "role": "discoverer", "argument_pos": []}, {"argument": "Rancher Labs company", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Now tracked as CVE -2018-1002105 , the flaw is critical , with a Common Vulnerability Scoring System ( CVSS ) score of 9.8 out of 10 .", "event": [{"event_trigger": "tracked as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-1002105", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Red Hat 's OpenShift Container Platform uses Kubernetes for orchestrating and managing containers is also impacted by the vulnerability .", "event": [{"event_trigger": "impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Kubernetes", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenShift Container Platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Red Hat", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The problem has been addressed in the latest Kubernetes revisions : v1 .10.11 , v1 .11.5 , v1 .12.3 , and v1.13.0 - rc .1 .", "event": [{"event_trigger": "has been addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The problem", "role": "vulnerability", "argument_pos": []}, {"argument": "the latest Kubernetes revisions", "role": "vulnerable system", "argument_pos": []}, {"argument": "v1 .10.11", "role": "patch number", "argument_pos": []}, {"argument": "v1 .11.5", "role": "patch number", "argument_pos": []}, {"argument": "v1 .12.3", "role": "patch number", "argument_pos": []}, {"argument": "v1.13.0 - rc .1", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Kubernetes releases prior to these along with the products and services based on them are affected by CVE -2018-1002105 .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-1002105", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Kubernetes", "role": "vulnerable system", "argument_pos": []}, {"argument": "releases prior", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Red Hat released patches for the OpenShift family of containerization software ( OpenShift Container Platform , OpenShift Online , and OpenShift Dedicated ) and users received service updates they can install at their earliest convenience .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Red Hat", "role": "releaser", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "the OpenShift family of containerization software", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenShift Container Platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenShift Dedicated", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenShift Online", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The software company warns that a malicious actor could exploit the vulnerability to steal data or inject malicious code , as well as \" bring down production applications and services from within an organization ’s firewall . \"", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "exploit the vulnerability", "role": "attack pattern", "argument_pos": []}, {"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "a malicious actor", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Merely a day after rolling out the December 2018 security patch early , Samsung has now revealed the details of the latest security maintenance release .", "event": [{"event_trigger": "rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security patch", "role": "patch", "argument_pos": []}, {"argument": "December 2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The Galaxy Xcover 4 is the first smartphone to get this update .", "event": [{"event_trigger": "get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Galaxy Xcover 4", "role": "vulnerable system", "argument_pos": []}, {"argument": "this update", "role": "patch", "argument_pos": []}, {"argument": "smartphone", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Samsung will be releasing the patch for more compatible devices in the coming weeks .", "event": [{"event_trigger": "will be releasing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Samsung", "role": "releaser", "argument_pos": []}, {"argument": "the patch", "role": "patch", "argument_pos": []}, {"argument": "compatible devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "the coming weeks", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The December 2018 security patch has fixes for six critical vulnerabilities discovered in the Android operating system .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "six critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the Android operating system", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "However , no moderate or low - risk vulnerabilities were required to be patched in this latest security maintenance release .", "event": [{"event_trigger": "be patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "moderate or low - risk vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "this latest security maintenance release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The update does bring quite a patches for 40 Samsung Vulnerabilities and Exposures ( SVE ) items .", "event": [{"event_trigger": "The update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Therefore , Samsung will now get down to the business of rolling out the December 2018 security patch to supported devices .", "event": [{"event_trigger": "rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Samsung", "role": "releaser", "argument_pos": []}, {"argument": "security patch", "role": "patch", "argument_pos": []}, {"argument": "supported devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "December 2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "This fairly quick response limited the ransomware damage and prevented the possible data breach .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "On the following Saturday , Karin Janiszewski stated : There has been no patient information breach .", "event": [{"event_trigger": "breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "patient information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "IT staff dealt with the outbreak to avoid a data breach When it comes to malware attacks on large companies , the loss of personal customer data is the worst thing that can happen .", "event": [{"event_trigger": "a data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "staff", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "It seems that this time the situation was handled quick enough to prevent having the sensitive data being compromised .", "event": [{"event_trigger": "being compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the sensitive data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Also , since this is a ransomware - type malware attack , hackers demand a ransom .", "event": [{"event_trigger": "a ransomware - type malware attack", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "However , officials did not select the scenario involving making the payment .", "event": [{"event_trigger": "making the payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "officials", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "No matter how big or how little the ransom demand is , officials should n't even consider making the payment because it may lead to system damage or permanent data loss .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "[ 3 ] In the United States , data breaches and malware attacks on huge organizations have become a common thing , especially in the healthcare industry .", "event": [{"event_trigger": "data breaches", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "huge organizations", "role": "victim", "argument_pos": []}, {"argument": "the healthcare industry", "role": "victim", "argument_pos": []}, {"argument": "the United States", "role": "place", "argument_pos": []}, {"argument": "malware attacks", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "In 2016 Hollywood Presbyterian Hospital paid the demanded ransom in Bitcoin after having its data encrypted .", "event": [{"event_trigger": "paid the demanded ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "2016", "role": "time", "argument_pos": []}, {"argument": "Hollywood Presbyterian Hospital", "role": "victim", "argument_pos": []}, {"argument": "in Bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "data encrypted", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "[ 4 ] The infection was widespread and the attack cost around $ 17 000 .", "event": [{"event_trigger": "the attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 17 000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "Another incident that resulted in ransom payment was spotted in Kansas Heart Hospital in 2016 also .", "event": [{"event_trigger": "ransom payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Kansas Heart Hospital", "role": "victim", "argument_pos": []}, {"argument": "2016", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Unfortunately , after the payment was made , attackers disappeared ignoring the promise to decrypt locked files .", "event": [{"event_trigger": "the payment was made", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "They send yet another ransom demand instead and asked for a bigger amount of money .", "event": [{"event_trigger": "ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "They", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "After considering different scenarios , the hospital decided to pay 4 BTC ( equal to $ 45 000 at that time ) for ransomware developers to get private keys needed for files ' recovery .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransomware developers", "role": "attacker", "argument_pos": []}, {"argument": "the hospital", "role": "victim", "argument_pos": []}, {"argument": "4 BTC", "role": "price", "argument_pos": []}, {"argument": "$ 45 000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "These were n't your garden - variety spam posts either , but rather , fraudsters were hacking into the verified accounts of celebrities and brands in an attempt to lure unsuspecting victims .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "hacking into the verified accounts", "role": "attack pattern", "argument_pos": []}, {"argument": "fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "unsuspecting victims", "role": "victim", "argument_pos": []}, {"argument": "celebrities", "role": "trusted entity", "argument_pos": []}, {"argument": "brands", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "This time , they 're gaming Facebook 's official sponsored ad system to fool eager people who are looking to make a quick profit .", "event": [{"event_trigger": "fool", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "eager people", "role": "victim", "argument_pos": []}, {"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "gaming Facebook 's official sponsored ad system", "role": "attack pattern", "argument_pos": []}, {"argument": "make a quick profit", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "This new ploy is a classic phishing scam that 's meant to steal your personal information like your name , email and credit card numbers .", "event": [{"event_trigger": "phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "steal your personal information", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "And similar to other elaborate phishing scams , these cybercriminals created a bunch of fake websites , news articles and ads for that purpose .", "event": [{"event_trigger": "created", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fake websites", "role": "tool", "argument_pos": []}, {"argument": "cybercriminals", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "If you take the bait and click through the ad , the ruse gets more obvious .", "event": [{"event_trigger": "take the bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "click through the ad", "role": "attack pattern", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "However , the fraudsters mimicked the look and feel of the real CNBC site so there 's a chance an unsuspecting eye might get duped .", "event": [{"event_trigger": "get duped", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Tenable was behind one software update to fix security flaws that ’s circulating this week .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "one software update", "role": "patch", "argument_pos": []}, {"argument": "security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Tenable", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The research arm of the Columbia - based cybersecurity company discovered a vulnerability in Zoom ’s conferencing platform that would allow attackers to take control of a user ’s desktop remotely during a meeting .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Columbia - based cybersecurity company", "role": "discoverer", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "conferencing platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow attackers to take control of a user ’s desktop remotely", "role": "capabilities", "argument_pos": []}, {"argument": "The research arm", "role": "discoverer", "argument_pos": []}, {"argument": "Zoom", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "After being alerted , Tenable said that Zoom quickly updated the software .", "event": [{"event_trigger": "updated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Zoom", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "According to Tenable , the security flaw , if exploited , would allow attackers to do the following : Hijack control of a screen , allowing them to download and execute malware .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Hijack control of a screen", "role": "capabilities", "argument_pos": []}, {"argument": "allowing them to download and execute malware", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "A blog post from the company states the vulnerability was discovered by Tenable ’s David Wells .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "David Wells", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Tenable", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "“ This impacts both one - on - one ( P2P ) meetings as well as group meetings streamed through Zoom servers , ” the blog post states , adding that the vulnerability could also be exploited over Wide Area Network ( WAN ) .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Wide Area Network ( WAN )", "role": "vulnerable system", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "To fix the vulnerability , Zoom patched servers and released new versions of the software .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Authorities on Wednesday charged two Iranian citizens for the ransomware cyber attack that hobbled the city of Atlanta ’s computer network in March , and the federal indictment outlines the pair ’s massive nationwide scheme to breach computer networks of local governments , health care systems and other public entities .", "event": [{"event_trigger": "the ransomware cyber attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Iranian citizens", "role": "attacker", "argument_pos": []}, {"argument": "computer network", "role": "victim", "argument_pos": []}, {"argument": "March", "role": "time", "argument_pos": []}, {"argument": "the city of Atlanta", "role": "victim", "argument_pos": []}, {"argument": "computer networks", "role": "victim", "argument_pos": []}, {"argument": "local governments", "role": "victim", "argument_pos": []}, {"argument": "health care systems", "role": "victim", "argument_pos": []}, {"argument": "public entities", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The defendants , Faramarz Shahi Savandi , 34 , and Mohammad Mehdi Shah Mansouri , 27 , are alleged to have developed the SamSam ransomware , malicious software that encrypts data until the infected organizations paid ransom .", "event": [{"event_trigger": "paid ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Faramarz Shahi Savandi", "role": "attacker", "argument_pos": []}, {"argument": "Mohammad Mehdi Shah Mansouri", "role": "attacker", "argument_pos": []}, {"argument": "The defendants", "role": "attacker", "argument_pos": []}, {"argument": "the SamSam ransomware", "role": "tool", "argument_pos": []}, {"argument": "malicious software", "role": "tool", "argument_pos": []}, {"argument": "encrypts data", "role": "attack pattern", "argument_pos": []}, {"argument": "the infected organizations", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "All told , the pair inflicted harm on more than 200 victims across the country and collected roughly $ 6 million in ransom over a three year period dating back to 2015 .", "event": [{"event_trigger": "ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 6 million", "role": "price", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "inflicted harm", "role": "attack pattern", "argument_pos": []}, {"argument": "the pair", "role": "attacker", "argument_pos": []}, {"argument": "over a three year", "role": "time", "argument_pos": []}, {"argument": "2015", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "“ The defendants allegedly hijacked victims ’ computer systems and shut them down until the victims paid a ransom , ” said Deputy Attorney General Rod Rosenstein , speaking at a press conference in Washington D.C. “ Many of the victims were public agencies with missions that involve saving lives and performing other critical functions for the American people . ”", "event": [{"event_trigger": "paid a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the victims", "role": "victim", "argument_pos": []}, {"argument": "hijacked victims ’ computer systems and shut them down", "role": "attack pattern", "argument_pos": []}, {"argument": "The defendants", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Atlanta officials have repeatedly denied paying the $ 51,000 in ransom demanded by the hackers and the 26 - page federal indictment released Wednesday does n’t directly address which cities and entities paid ransom .", "event": [{"event_trigger": "paid ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "cities", "role": "victim", "argument_pos": []}, {"argument": "entities", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Brian Benczkowski , an assistant attorney general for the U.S. Justice Department , told reporters on Wednesday that the agency would n’t identify which victims paid the attackers .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A city of Atlanta spokesperson on Wednesday said again that no one acting on the city ’s behalf , including its insurance carrier , paid any ransom .", "event": [{"event_trigger": "paid any ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "its insurance carrier", "role": "victim", "argument_pos": []}, {"argument": "behalf", "role": "victim", "argument_pos": []}, {"argument": "city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "But the indictment has two references to Atlanta and it raises questions about whether or not the city paid ransom .", "event": [{"event_trigger": "paid ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The indictment describes the March 22 assault on Atlanta ’s network and the effort by the two men to demand ransom .", "event": [{"event_trigger": "assault", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "network", "role": "victim", "argument_pos": []}, {"argument": "March 22", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "In one paragraph , the indictment says they demanded ransom from Atlanta in Bitcoin payments in exchange for encryption keys to recover the city ’s compromised data .", "event": [{"event_trigger": "demanded ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "Bitcoin payments", "role": "payment method", "argument_pos": []}, {"argument": "Atlanta", "role": "victim", "argument_pos": []}, {"argument": "city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The next paragraph says that on April 19 , Savandi “ received funds associated with ransom proceeds , which were converted into Iranian rial and deposited by ” an currency exchanger .", "event": [{"event_trigger": "ransom proceeds", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Savandi", "role": "attacker", "argument_pos": []}, {"argument": "deposited by ” an currency exchanger", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "The indictment describes how the two men demanded payments in bitcoins , a so - called crypto currency , and in Atlanta ’s case , the demand equaled roughly $ 50,000 .", "event": [{"event_trigger": "the demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 50,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "Tony UcedaVelez , CEO of Versprite , an Atlanta based security services said the language in the indictment does make it seem a ransom was paid on the city ’s behalf .", "event": [{"event_trigger": "a ransom was paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "city", "role": "victim", "argument_pos": []}, {"argument": "behalf", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Newark paid its ransom of roughly $ 30,000 .", "event": [{"event_trigger": "paid its ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 30,000", "role": "price", "argument_pos": []}, {"argument": "Newark", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has released a new patch designed to fix a failed update which has not prevented the exploit of a severe Webex vulnerability .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a new patch", "role": "patch", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The original security flaw , CVE -2018-15442 , is present in the Cisco Webex Meetings Desktop App for Windows and is described as a bug which \" could allow an authenticated , local attacker to execute arbitrary commands as a privileged user . \"", "event": [{"event_trigger": "is described", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "execute arbitrary commands as a privileged user", "role": "capabilities", "argument_pos": []}, {"argument": "a bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco 's original security update was published in October in order to remedy the flaw , in which a lack of validation for user - supplied parameters in the app could be harnessed to exploit the bug .", "event": [{"event_trigger": "was published", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco 's original security update", "role": "patch", "argument_pos": []}, {"argument": "October", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "\" While the CVSS Attack Vector metric denotes the requirement for an attacker to have local access , administrators should be aware that in Active Directory deployments , the vulnerability could be exploited remotely by leveraging the operating system remote management tools , \" the company added .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "leveraging the operating system remote management tools", "role": "capabilities", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "It was not long after the release of the first patch that researchers from SecureAuth deemed the original fix incomplete .", "event": [{"event_trigger": "the release", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the first patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "\" The vulnerability can be exploited by copying to a local attacker controller folder , the ptUpdate.exe binary , \" the researchers said in an advisory .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "copying to a local attacker controller folder", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "A new patch was then issued roughly a week after being informed of the issue .", "event": [{"event_trigger": "being informed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" A new fix was developed , and the advisory was updated on November 27 , 2018 , to reflect which software releases include the complete fix . \"", "event": [{"event_trigger": "was developed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "A new fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "LONDON — The U.K. agency tasked with fighting cyberthreats on Thursday announced a new process for the public disclosure of potentially sensitive software flaws , introducing a new level of transparency to its work .", "event": [{"event_trigger": "the public disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "software flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The National Cyber Security Centre laid out its new procedure , called the \" Equities Process \" in a blog post that details how it makes decisions on whether to make public the discovery of new flaws .", "event": [{"event_trigger": "make public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the discovery of new flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "National security operations sometimes hold back from announcing the discovery of security flaws in part because the bugs can be used to gather intelligence .", "event": [{"event_trigger": "announcing", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the discovery of security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "National security operations", "role": "discoverer", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "gather intelligence", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The default position , the NCSC said , is to disclose those vulnerabilities to the public after fixes have been made .", "event": [{"event_trigger": "disclose", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "those vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The goal is to prevent cyberattacks like “ WannaCry , ” which paralyzed computer systems around the world in May 2017 .", "event": [{"event_trigger": "cyberattacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "computer systems", "role": "victim", "argument_pos": []}, {"argument": "May 2017", "role": "time", "argument_pos": []}, {"argument": "WannaCry", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "WannaCry underscored the dangers of not patching or updating software .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "“ If you patch your software , a lot of the stuff that we ’ve found goes away . ”", "event": [{"event_trigger": "patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "your software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Levy said the primary goal of more transparency is to “ bang the drum ” about basic cybersecurity , like patching and secure network setups .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Update , Cisco will take a second crack at addressing a vulnerability in WebEx that can be exploited to execute malicious code on a vulnerable installation .", "event": [{"event_trigger": "addressing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "WebEx", "role": "vulnerable system", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Switchzilla has issued a new fix to address CVE -2018-15442 , a command injection bug in its video conference software that allows a local attacker to their elevate privileges , and then execute code by injecting commands through the software update component of the WebEx Meetings Client .", "event": [{"event_trigger": "has issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Switchzilla", "role": "releaser", "argument_pos": []}, {"argument": "a new fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco had hoped to plug the vulnerability in October with a patch that was thought to have resolved the flaw .", "event": [{"event_trigger": "plug", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "October", "role": "time", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "By sticking the malicious commands inside a DLL file and then executing the update program with that library loaded , an attacker would be able to circumvent the patch and then exploit the flaw as before to execute commands with system - level clearance .", "event": [{"event_trigger": "exploit", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "execute commands with system - level clearance", "role": "capabilities", "argument_pos": []}, {"argument": "attacker", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" The vulnerability can be exploited by copying to an a local attacker controller folder , the ptUpdate.exe binary .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "To gain privileges , the attacker must start the service with the command line : \" Fortunately , the flaw was privately disclosed to Cisco , giving the teleconferencing vendor time to get out a fix prior to this bug going public .", "event": [{"event_trigger": "get out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "the teleconferencing vendor", "role": "releaser", "argument_pos": []}, {"argument": "this bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "While the flaw is n't as severe as a remote code bug that could be exploited without any user interaction , the fact it has now been patched twice and has working proof - of - concept code public should make patching a priority .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "proof - of - concept code", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "But just in time for the Cyber Monday shopping rush , watch out for sinister phishing scams that are making the rounds .", "event": [{"event_trigger": "phishing scams", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "With more online shoppers this time around - searching every nook and cranny of the web in search of the best Cyber Monday deals - crooks are again looking to dupe unsuspecting bargain hunters .", "event": [{"event_trigger": "dupe", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "crooks", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "One of the most effective tools for a cybercriminal is the phishing scam .", "event": [{"event_trigger": "phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "cybercriminal", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "This is when a scammer poses as a trustworthy entity and tries tricking you into clicking on a malicious link .", "event": [{"event_trigger": "poses as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "scammer", "role": "attacker", "argument_pos": []}, {"argument": "trustworthy entity", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Their ultimate goal , of course , is to steal your sensitive information such as credit card details , usernames and passwords .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "sensitive information", "role": "compromised data", "argument_pos": []}, {"argument": "credit card details", "role": "compromised data", "argument_pos": []}, {"argument": "usernames", "role": "compromised data", "argument_pos": []}, {"argument": "passwords", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "For example , if you receive an email from \" Amazon \" saying that you have a pending delivery that needs verification from you , then that is most likely a phishing scam .", "event": [{"event_trigger": "phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Other email phishing scams may also pretend to provide you with a link for shipping updates or special discount coupons and offers .", "event": [{"event_trigger": "email phishing scams", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "These alarming emails are meant to get you clicking by pretending you ordered thousands of dollars of merchandise .", "event": [{"event_trigger": "pretending", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "get you clicking", "role": "attack pattern", "argument_pos": []}, {"argument": "alarming emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Fake delivery and shipping notifications can look just like the real thing , using real logos and art from company websites .", "event": [{"event_trigger": "look just like", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "real logos", "role": "trusted entity", "argument_pos": []}, {"argument": "company websites", "role": "trusted entity", "argument_pos": []}, {"argument": "Fake delivery and shipping notifications", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "These cybercriminals will even set up fake websites that look like the real deal to lure you into giving away your personal information and credit card details .", "event": [{"event_trigger": "set up", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "cybercriminals", "role": "attacker", "argument_pos": []}, {"argument": "fake websites", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "SCAMMERS are using fake websites to lure in Cyber Monday and Christmas shoppers and take their money .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "shoppers", "role": "victim", "argument_pos": []}, {"argument": "are using fake websites", "role": "attack pattern", "argument_pos": []}, {"argument": "SCAMMERS", "role": "attacker", "argument_pos": []}, {"argument": "take their money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "With shoppers set to spend £ 2.96 billion by the end of Cyber Monday , fraud experts have warned that scammers will tempt shoppers with suspiciously good deals so they buy their counterfeit items and hand over their card details .", "event": [{"event_trigger": "will tempt", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "shoppers", "role": "victim", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "hand over their card details", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "They 'll also set up fake websites that look like genuine retailers to trick people into giving away their data and payment details , according to a new report by Action Fraud and the City of London Police .", "event": [{"event_trigger": "set up", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fake websites", "role": "tool", "argument_pos": []}, {"argument": "They", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Phishing emails containing tempting deals which entice shoppers to click on links to fake websites are also on the rise on Cyber Monday and over the Christmas period , the report said .", "event": [{"event_trigger": "entice", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "click on links to fake websites", "role": "attack pattern", "argument_pos": []}, {"argument": "Phishing emails containing tempting deals", "role": "attack pattern", "argument_pos": []}, {"argument": "shoppers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Detective Chief Superintendent Pete O’Doherty , of the City of London Police , said : “ Unfortunately , at what is an expensive time of year for many , the internet has provided fraudsters with a platform to lure people in with the promise of cheap deals .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "people", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Meanwhile scammers claiming to be from Tesco are running a fake competition in an attempt to steal your bank details .", "event": [{"event_trigger": "claiming to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "Tesco", "role": "trusted entity", "argument_pos": []}, {"argument": "are running a fake competition", "role": "attack pattern", "argument_pos": []}, {"argument": "steal your bank details", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The Internal Revenue Service today warned the public of a tax transcript scheme via a surge of fraudulent emails impersonating the IRS .", "event": [{"event_trigger": "impersonating", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the IRS", "role": "trusted entity", "argument_pos": []}, {"argument": "fraudulent emails", "role": "tool", "argument_pos": []}, {"argument": "today", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The emails offer tax transcripts , or the summary of a tax return , as bait to entice users to open documents containing malware .", "event": [{"event_trigger": "offer", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "tax transcripts", "role": "trusted entity", "argument_pos": []}, {"argument": "The emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The IRS said the scam is especially problematic for businesses whose employees might open the malware because it can spread throughout the network and potentially take months to successfully remove .", "event": [{"event_trigger": "the scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "businesses", "role": "victim", "argument_pos": []}, {"argument": "open the malware", "role": "purpose", "argument_pos": []}, {"argument": "employees", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Known as Emotet , the well - known malware generally poses as specific banks and financial institutions in its effort to trick people into opening infected documents .", "event": [{"event_trigger": "poses as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Emotet", "role": "tool", "argument_pos": []}, {"argument": "specific banks", "role": "trusted entity", "argument_pos": []}, {"argument": "financial institutions", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "However , in the past few weeks , the scam has been masquerading as the IRS , pretending to be from “ IRS Online . ”", "event": [{"event_trigger": "has been masquerading as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the past few weeks", "role": "time", "argument_pos": []}, {"argument": "the IRS", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft 's new Outlook 2010 update ought to provide the critical security fixes without the crashes .", "event": [{"event_trigger": "provide", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the critical security fixes", "role": "patch", "argument_pos": []}, {"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "new Outlook 2010", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has released a new update for Outlook 2010 that should plug its critical security flaws without causing crashes .", "event": [{"event_trigger": "plug", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "its critical security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Despite the crashes , Microsoft warned users not to remove the update , which plugged four remote code execution flaws that it said were more likely be exploited .", "event": [{"event_trigger": "plugged", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "four remote code execution flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the update", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Until a new update was released Microsoft recommended users try Outlook Web Access instead .", "event": [{"event_trigger": "was released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a new update", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "As spotted by Woody Leonhard , Microsoft this week released KB 4461585 for Outlook 2010 , which includes patches for the four flaws and should n't trigger crashes .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "KB 4461585", "role": "patch number", "argument_pos": []}, {"argument": "Outlook 2010", "role": "vulnerable system", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "the four flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft confirmed it does fix the crash issues caused by KB 4461529 .", "event": [{"event_trigger": "does fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "the crash issues", "role": "vulnerability", "argument_pos": []}, {"argument": "KB 4461529", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "The fixed update can be downloaded from Microsoft 's download center and not the Microsoft Update Catalog .", "event": [{"event_trigger": "be downloaded", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The fixed update", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "download center", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "There are no further updates available for the Outlook 2010 non-security updates KB4461522 and KB2863821 , which Microsoft pulled on November 15 because they were causing crashes in Access and other apps .", "event": [{"event_trigger": "available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "KB2863821", "role": "vulnerable system version", "argument_pos": []}, {"argument": "KB4461522", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Outlook 2010", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "US Postal Service website flaw was patched this week but reported by a security researcher a year ago .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a security researcher", "role": "discoverer", "argument_pos": []}, {"argument": "a year ago", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The US Postal Service has fixed a security bug in its website that allowed anyone with an account to see the account details of the site 's 60 million users .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The US Postal Service", "role": "releaser", "argument_pos": []}, {"argument": "a security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "its website", "role": "vulnerable system", "argument_pos": []}, {"argument": "allowed anyone with an account to see the account details", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw was patched this week after USPS was informed of the issue by Krebs on Security , which reports that an unnamed independent researcher reported the bug a year ago but never received a response .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a year ago", "role": "time", "argument_pos": []}, {"argument": "an unnamed independent researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" Computer networks are constantly under attack from criminals who try to exploit vulnerabilities to illegally obtain information .", "event": [{"event_trigger": "obtain", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "criminals", "role": "attacker", "argument_pos": []}, {"argument": "information", "role": "compromised data", "argument_pos": []}, {"argument": "exploit vulnerabilities", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "USPS has faced scrutiny in the past , after a 2014 hack exposed personal information on 800,000 employees , 485,000 workers ' compensation records , and 2.9 million customer - inquiry records .", "event": [{"event_trigger": "hack exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "personal information", "role": "compromised data", "argument_pos": []}, {"argument": "800,000", "role": "number of victim", "argument_pos": []}, {"argument": "485,000", "role": "number of data", "argument_pos": []}, {"argument": "2.9 million", "role": "number of data", "argument_pos": []}, {"argument": "customer - inquiry records", "role": "compromised data", "argument_pos": []}, {"argument": "employees", "role": "victim", "argument_pos": []}, {"argument": "compensation records", "role": "compromised data", "argument_pos": []}, {"argument": "USPS", "role": "victim", "argument_pos": []}, {"argument": "2014", "role": "time", "argument_pos": []}, {"argument": "workers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The US Postal Service says it ’s fixed a security weakness on usps.com that let anyone see the personal account info of its users , including usernames and street addresses .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The US Postal Service", "role": "releaser", "argument_pos": []}, {"argument": "a security weakness", "role": "vulnerability", "argument_pos": []}, {"argument": "usps.com", "role": "vulnerable system", "argument_pos": []}, {"argument": "let anyone see the personal account info of its users", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The open vulnerability was reportedly identified over a year ago by an independent researcher but USPS never patched it until this week , when Krebs on Security flagged the issue .", "event": [{"event_trigger": "never patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "USPS", "role": "releaser", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Users ’ personal data including emails , phone numbers , mailing campaign data were all exposed to anyone who was logged into the site .", "event": [{"event_trigger": "were all exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "mailing campaign data", "role": "compromised data", "argument_pos": []}, {"argument": "phone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "emails", "role": "compromised data", "argument_pos": []}, {"argument": "personal data", "role": "compromised data", "argument_pos": []}, {"argument": "the site", "role": "victim", "argument_pos": []}, {"argument": "Users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "USPS said in a statement to Krebs : “ Any information suggesting criminals have tried to exploit potential vulnerabilities in our network is taken very seriously .", "event": [{"event_trigger": "exploit", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "network", "role": "vulnerable system", "argument_pos": []}, {"argument": "criminals", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The Indiana Department of Revenue and the Internal Revenue Service is warning individuals and businesses about emails that use tax transcripts as bait to entice users to open attachments .", "event": [{"event_trigger": "as bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "tax transcripts", "role": "trusted entity", "argument_pos": []}, {"argument": "emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "This well - known malware , known as Emotet , generally poses as specific banks or financial institutions to trick individuals into opening infected documents .", "event": [{"event_trigger": "poses as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "specific banks", "role": "trusted entity", "argument_pos": []}, {"argument": "financial institutions", "role": "trusted entity", "argument_pos": []}, {"argument": "Emotet", "role": "tool", "argument_pos": []}, {"argument": "This well - known malware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Both the DOR and IRS have several tips to help individuals and businesses stay clear of these scams : - The DOR and IRS do not contact customers via email to share sensitive documents such as a tax transcript - Use security software to protect against malware and viruses , and make sure it ’s up - to - date - Never open emails , attachments , or click on links when you ’re not sure of the source If you receive an email claiming to be the IRS , delete it or forward the email to phishing@irs.gov .", "event": [{"event_trigger": "receive", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "an email", "role": "tool", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "If the email claims to be from the DOR forward it to investigations@dor.in.gov .", "event": [{"event_trigger": "claims to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the email", "role": "tool", "argument_pos": []}, {"argument": "the DOR", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Emotet is known to constantly evolve , and in the past few weeks has masqueraded as the IRS , pretending to be “ IRS Online ” .", "event": [{"event_trigger": "has masqueraded as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Emotet", "role": "tool", "argument_pos": []}, {"argument": "the past few weeks", "role": "time", "argument_pos": []}, {"argument": "the IRS", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has emitted software updates to address a critical vulnerability in Flash Player for Windows , Mac , and Linux .", "event": [{"event_trigger": "has emitted", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "software updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "PC owners and admins will want to upgrade their copies of Flash to version 31.0.0.153 or later in order to get the patch – or just dump the damn thing all together .", "event": [{"event_trigger": "get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The November 20 security update addresses a single flaw , designated CVE -2018-15981 .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a single flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "security update", "role": "patch", "argument_pos": []}, {"argument": "November", "role": "time", "argument_pos": []}, {"argument": "CVE -2018-15981", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "It is a type confusion bug that can be exploited to achieve remote code execution .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a type confusion bug", "role": "vulnerability", "argument_pos": []}, {"argument": "achieve remote code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Because Adobe does not maintain a fixed patching schedule for Flash Player , this is n't technically considered an out - of - band band - aid .", "event": [{"event_trigger": "a fixed patching schedule", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "However , the update does come just one week after Adobe pushed out a handful of fixes for Patch Tuesday , including one for an information disclosure vulnerability in Flash Player .", "event": [{"event_trigger": "pushed out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "an information disclosure vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "That Adobe would post another update just one week after their last patch should underscore that CVE -2018-15981 is a serious enough vulnerability to be a priority fix for users and admins .", "event": [{"event_trigger": "would post", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their last patch", "role": "patch", "argument_pos": []}, {"argument": "one week after", "role": "time", "argument_pos": []}, {"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "After installing this latest fix , those who are tired of the constant security threats might also want to consider taking the advice of multiple security experts and developers and at least disable Flash by default if not permanently .", "event": [{"event_trigger": "installing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "latest fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Although most Google devices — including older Nexus devices — received the patch at the beginning of the month as detailed below , the original Pixel lineup was left high and dry .", "event": [{"event_trigger": "received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}, {"argument": "older Nexus devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "Google devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "the beginning of the month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Right on schedule , Google has released Android ’s October security patch .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security patch", "role": "patch", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}, {"argument": "Android", "role": "vulnerable system", "argument_pos": []}, {"argument": "October", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Unfortunately , it wo n’t resolve the memory issues just yet .", "event": [{"event_trigger": "resolve", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the memory issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Sadly , the November security patch will likely be the last update pushed to the Pixel C , Nexus 6P , and Nexus 5X .", "event": [{"event_trigger": "pushed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Pixel C", "role": "vulnerable system", "argument_pos": []}, {"argument": "Nexus 6P", "role": "vulnerable system", "argument_pos": []}, {"argument": "Nexus 5X", "role": "vulnerable system", "argument_pos": []}, {"argument": "security patch", "role": "patch", "argument_pos": []}, {"argument": "the last update", "role": "patch", "argument_pos": []}, {"argument": "November", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Even if you no longer get official support from Google , there are large developer communities that build ROMs that brings the latest security patches and Android features to all of Google ’s abandoned devices .", "event": [{"event_trigger": "brings", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "large developer communities", "role": "releaser", "argument_pos": []}, {"argument": "the latest security patches", "role": "patch", "argument_pos": []}, {"argument": "abandoned devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to the resolved issues addressed above , this update brings support for the company ’s Audio Adapter HD module .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "issues", "role": "vulnerability", "argument_pos": []}, {"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "Audio Adapter HD module", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "MONTREAL — On Sept 10 , municipal employees in a region between Montreal and Quebec City arrived at work to discover a threatening message on their computers notifying them they were locked out of all their files .", "event": [{"event_trigger": "notifying", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "were locked out of all their files", "role": "attack pattern", "argument_pos": []}, {"argument": "their computers", "role": "victim", "argument_pos": []}, {"argument": "Sept 10", "role": "time", "argument_pos": []}, {"argument": "municipal employees", "role": "victim", "argument_pos": []}, {"argument": "Montreal", "role": "place", "argument_pos": []}, {"argument": "Quebec City", "role": "place", "argument_pos": []}, {"argument": "a threatening message", "role": "tool", "argument_pos": []}, {"argument": "them", "role": "victim", "argument_pos": []}, {"argument": "they", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In order to regain access to its data , the regional municipality of Mekinac was told to deposit eight units of the digital currency Bitcoin into a bank account — roughly equivalent to $ 65,000 .", "event": [{"event_trigger": "was told to deposit", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "eight units of the digital currency Bitcoin", "role": "price", "argument_pos": []}, {"argument": "$ 65,000", "role": "price", "argument_pos": []}, {"argument": "the regional municipality of Mekinac", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Mekinac ’s IT department eventually negotiated the cyber extortionists down and paid $ 30,000 in Bitcoin , but not before the region ’s servers were disabled for about two weeks .", "event": [{"event_trigger": "negotiated", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Mekinac ’s IT department", "role": "victim", "argument_pos": []}, {"argument": "the cyber extortionists", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Bernard Thompson , reeve for the Mekinac regional municipality , said the ransom demand presented a real dilemma for his small organization .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "his small organization", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Mekinac ’s attackers used malicious software — known as malware or ransomware — to demand money in return for keys to unlock the data .", "event": [{"event_trigger": "demand money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "malware", "role": "tool", "argument_pos": []}, {"argument": "used malicious software", "role": "attack pattern", "argument_pos": []}, {"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "Mekinac", "role": "victim", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Several municipal governments and businesses in Ontario were recently hit by ransomware attacks , prompting the Ontario Provincial Police to issue an advisory in September .", "event": [{"event_trigger": "hit by ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "businesses", "role": "victim", "argument_pos": []}, {"argument": "Several municipal governments", "role": "victim", "argument_pos": []}, {"argument": "Ontario", "role": "place", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Mekinac ’s servers were compromised after an employee opened and clicked on a link in a fraudulent email sent by the hackers .", "event": [{"event_trigger": "sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the hackers", "role": "attacker", "argument_pos": []}, {"argument": "a fraudulent email", "role": "tool", "argument_pos": []}, {"argument": "an employee", "role": "victim", "argument_pos": []}, {"argument": "opened and clicked on a link", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The hackers then encrypted all the data and held it hostage until they received their bitcoins .", "event": [{"event_trigger": "received", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "their bitcoins", "role": "price", "argument_pos": []}, {"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "encrypted all the data", "role": "attack pattern", "argument_pos": []}, {"argument": "The hackers", "role": "attacker", "argument_pos": []}, {"argument": "held it hostage", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "“ You either pay or you do n’t get the data . ”", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "You", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Thompson said police seized some of his computers for analysis and told his office not to negotiate or pay the criminals .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the criminals", "role": "attacker", "argument_pos": []}, {"argument": "his office", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "So they paid , got their data back and learned a valuable lesson .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "they", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has patched a major zero - day vulnerability in Windows , the second such exploit detected in just a few weeks .", "event": [{"event_trigger": "detected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "exploit", "role": "vulnerability", "argument_pos": []}, {"argument": "a few weeks", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The threat , the second such alert in just a month , was spotted by security experts at Kaspersky Lab and fixed as part of Microsoft 's monthly Patch Tuesday release .", "event": [{"event_trigger": "was spotted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security experts", "role": "discoverer", "argument_pos": []}, {"argument": "Kaspersky Lab", "role": "discoverer", "argument_pos": []}, {"argument": "a month", "role": "time", "argument_pos": []}, {"argument": "The threat", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Kaspersky Lab says the exploit had already been utilised for a number of cyberattacks in the Middle East , and was detected by the company 's Automatic Exploit Prevention technology .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Kaspersky Lab", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , officially named by Microsoft as CVE -2018-8589 , targeted the 32 - bit version of Windows 7 , and could have allowed attackers to gain \" elevated privileges \" and create exploits to gain access to a victim 's system and run malicious code .", "event": [{"event_trigger": "officially named", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-8589", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Windows 7", "role": "vulnerable system", "argument_pos": []}, {"argument": "allowed attackers to gain \" elevated privileges \"", "role": "capabilities", "argument_pos": []}, {"argument": "create exploits to gain access to a victim 's system", "role": "capabilities", "argument_pos": []}, {"argument": "run malicious code", "role": "capabilities", "argument_pos": []}, {"argument": "32 - bit version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The news comes just a few weeks after Kaspersky Lab detected a similar zero - day threat in Microsoft 's system , having alerted the computing giant to a further Windows vulnerability that had been utilised by state - backed cyber-espionage group known as FruityArmor .", "event": [{"event_trigger": "having alerted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the computing giant", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "a further Windows vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In just a month , we discovered two of their kind and detected two series of attacks in one region .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "two of their kind", "role": "vulnerability", "argument_pos": []}, {"argument": "we", "role": "discoverer", "argument_pos": []}, {"argument": "month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Banks in Russia today were the target of a massive phishing campaign that aimed to deliver a tool used by the Silence group of hackers .", "event": [{"event_trigger": "phishing campaign", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the Silence group", "role": "attacker", "argument_pos": []}, {"argument": "Banks", "role": "trusted entity", "argument_pos": []}, {"argument": "Russia", "role": "place", "argument_pos": []}, {"argument": "today", "role": "time", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The fraudulent emails purported to come from the Central Bank of Russia ( CBR ) and contained a malicious attachment .", "event": [{"event_trigger": "purported to come", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The fraudulent emails", "role": "tool", "argument_pos": []}, {"argument": "the Central Bank of Russia ( CBR )", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The message body lured the recipients to open the attachment in order to check the latest details on the \" standardization of the format of CBR 's electronic communications . \"", "event": [{"event_trigger": "lured", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The message body", "role": "tool", "argument_pos": []}, {"argument": "open the attachment", "role": "attack pattern", "argument_pos": []}, {"argument": "the recipients", "role": "victim", "argument_pos": []}, {"argument": "check the latest details", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "This supports the theory that the attackers had access to legitimate emails from CBR .", "event": [{"event_trigger": "had access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "legitimate emails", "role": "compromised data", "argument_pos": []}, {"argument": "CBR", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In a report published today , Group - IB says that the attackers spoofed the sender 's email address but the messages did not pass the DKIM ( DomainKeys Identified Mail ) validation .", "event": [{"event_trigger": "spoofed", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "email address", "role": "trusted entity", "argument_pos": []}, {"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "sender", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Banks see more spear - phishing from a different group The Silence hackers are not the only ones trying their spear - phishing game on Russian banks .", "event": [{"event_trigger": "their spear - phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The Silence hackers", "role": "attacker", "argument_pos": []}, {"argument": "Russian banks", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Their message spoofed an email address from the Financial Sector Computer Emergency Response Team ( FinCERT ) and contained five attachments disguised as documents from CBR .", "event": [{"event_trigger": "spoofed", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Their message", "role": "tool", "argument_pos": []}, {"argument": "an email address", "role": "trusted entity", "argument_pos": []}, {"argument": "the Financial Sector Computer Emergency Response Team ( FinCERT )", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "As in the case of Silence , this attacker is also thought to have had access to CBR documents , most likely from compromised inboxes of Russian banks employees .", "event": [{"event_trigger": "have had access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "attacker", "role": "attacker", "argument_pos": []}, {"argument": "CBR documents", "role": "compromised data", "argument_pos": []}, {"argument": "Russian banks employees", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "This allowed them to craft messages that would pass even eyes trained in spotting fraudulent emails .", "event": [{"event_trigger": "craft", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "messages", "role": "tool", "argument_pos": []}, {"argument": "them", "role": "attacker", "argument_pos": []}, {"argument": "fraudulent emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Silence and MoneyTaker are the most dangerous threats to banks According to Group - IB , multiple groups use the Central Bank of Russia in spear - phishing operations , and for good reason , since the organization dictates regulations to financial institutions in the country and maintains a constant communication flow with them .", "event": [{"event_trigger": "spear - phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "multiple groups", "role": "attacker", "argument_pos": []}, {"argument": "the Central Bank of Russia", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Although Silence uses mainly phishing , they are more careful about crafting the message , paying attention to both content and design , adds Group - IB 's threat intelligence expert .", "event": [{"event_trigger": "crafting", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "the message", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "A design flaw affecting all in - display fingerprint sensors – that left over a half - dozen cellphone models vulnerable to a trivial lock - screen bypass attack – has been quietly patched .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "in - display fingerprint sensors", "role": "vulnerable system", "argument_pos": []}, {"argument": "A design flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In - display fingerprint reader technology is widely considered an up - and - coming feature to be used in a number of flagship model phones introduced in 2019 by top OEM phone makers , according to Tencent ’s Xuanwu Lab which is credited for first identifying the flaw earlier this year .", "event": [{"event_trigger": "first identifying", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tencent ’s Xuanwu Lab", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "earlier this year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Yu said that many more cellphone manufacturers are impacted by the issue .", "event": [{"event_trigger": "are impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "cellphone manufacturers", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Yu", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "He noted Huawei has been forthcoming , issuing patches to address the issue .", "event": [{"event_trigger": "issuing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Huawei", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , which Huawei issued a patch ( CVE -2018-7929 ) for in September , can be exploited in a matter of seconds , researchers said .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "September", "role": "time", "argument_pos": []}, {"argument": "CVE -2018-7929", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "Huawei", "role": "releaser", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The industrial company on Tuesday released mitigations for eight vulnerabilities overall .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The industrial company", "role": "releaser", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "mitigations", "role": "patch", "argument_pos": []}, {"argument": "eight vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Siemens AG on Tuesday issued a slew of fixes addressing eight vulnerabilities spanning its industrial product lines .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "Siemens AG", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw could allow an attacker to gain unauthorized access to industrial networks and ultimately put operations and production at risk .", "event": [{"event_trigger": "gain unauthorized access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "industrial networks", "role": "victim", "argument_pos": []}, {"argument": "attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Siemens S602 , S612 , S623 , S627 - 2M SCALANCE devices with software versions prior to V4 .0.1.1 are impacted .", "event": [{"event_trigger": "are impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "versions prior to V4 .0.1.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Siemens", "role": "discoverer", "argument_pos": []}, {"argument": "S627 - 2M", "role": "vulnerable system version", "argument_pos": []}, {"argument": "S623", "role": "vulnerable system version", "argument_pos": []}, {"argument": "S612", "role": "vulnerable system version", "argument_pos": []}, {"argument": "S602", "role": "vulnerable system version", "argument_pos": []}, {"argument": "SCALANCE devices", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers with Applied Risk , who discovered the flaw , said that vulnerability exists in the web server of the firewall software .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Applied Risk", "role": "discoverer", "argument_pos": []}, {"argument": "Researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "An attacker can carry out the attack by crafting a malicious link and tricking an administrator – who is logged into the web server – to click that link .", "event": [{"event_trigger": "crafting", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "attacker", "role": "attacker", "argument_pos": []}, {"argument": "a malicious link", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "“ The integrated web server allows a cross-site scripting attack if an administrator is misled into accessing a malicious link , ” Applied Risk researcher Nelson Berg said in an analysis of the flaw .", "event": [{"event_trigger": "said in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Applied Risk researcher Nelson Berg", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , CVE -2018-16555 , has a CVSS score which Applied Risk researcher calculates to be 8.2 ( or high severity ) .", "event": [{"event_trigger": "calculates", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Applied Risk researcher", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-16555", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "That said , researchers said a successful exploit is not completely seamless and takes some time and effort to carry out – for an attacker to exploit the flaw , user interaction is required and the administrator must be logged into the web interface .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "user interaction is required", "role": "capabilities", "argument_pos": []}, {"argument": "the administrator must be logged into the web interface", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers said that no exploit of the vulnerability has been discovered thus far .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Siemens addressed the reported vulnerability by releasing a software update ( V4 .0.1.1 ) and also advised customers to “ only access links from trusted sources in the browser you use to access the SCALANCE S administration website . ”", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Siemens", "role": "releaser", "argument_pos": []}, {"argument": "reported vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The industrial company also released an array of fixes for other vulnerabilities on Tuesday .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "The industrial company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Another serious vulnerability ( CVE -2018-16556 ) addressed was an improper input validation flaw in certain Siemens S7 - 400 CPUs .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-16556", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "serious vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "improper input validation flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Siemens S7 - 400 CPUs", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "An improper access control vulnerability that is exploitable remotely in Siemens IEC 61850 system configurator , DIGSI 5 , DIGSI 4 , SICAM PAS / PQS , SICAM PQ Analyzer , and SICAM SCC , was also mitigated .", "event": [{"event_trigger": "mitigated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "improper access control vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Siemens IEC 61850 system configurator", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , CVE -2018-4858 , has a CVSS of 4.2 and exists in a service of the affected products listening on all of the host ’s network interfaces on either Port 4884 / TCP , Port 5885 / TCP , or Port 5886 / TCP .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-4858", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "a service", "role": "vulnerable system", "argument_pos": []}, {"argument": "products", "role": "vulnerable system", "argument_pos": []}, {"argument": "the host ’s network interfaces", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The service could allow an attacker to either exfiltrate limited data from the system or execute code with Microsoft Windows user permissions .", "event": [{"event_trigger": "exfiltrate", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "an attacker", "role": "attacker", "argument_pos": []}, {"argument": "limited data", "role": "compromised data", "argument_pos": []}, {"argument": "the system", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Also mitigated were an improper authentication vulnerability ( CVE -2018-13804 ) in SIMATIC IT Production Suite and a code injection vulnerability ( CVE -2018-13814 ) in SIMATIC Panels and SIMATIC WinCC that could allow an attacker with network access to the web server to perform a HTTP header injection attack .", "event": [{"event_trigger": "mitigated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "improper authentication vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-13804", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "SIMATIC IT Production Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "code injection vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-13814", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "SIMATIC Panels", "role": "vulnerable system", "argument_pos": []}, {"argument": "SIMATIC WinCC", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow an attacker with network access", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Yesterday , on Microsoft ’s Patch Tuesday the company released its monthly security patches that fixed 62 security flaws .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "Yesterday", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "These fixes also included a fix for a zero - day vulnerability that was under active exploitation before these patches were made available .", "event": [{"event_trigger": "were made available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these patches", "role": "patch", "argument_pos": []}, {"argument": "These fixes", "role": "patch", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "a zero - day vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft credited Kaspersky Lab researchers for discovering this zero - day , which is also known as CVE -2018-8589 and impacts the Windows Win32k component .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "zero - day", "role": "vulnerability", "argument_pos": []}, {"argument": "Kaspersky Lab researchers", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-8589", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "A Kaspersky spokesperson told ZDNet , “ they discovered the zero - day being exploited by multiple cyber-espionage groups ( APTs ) . ”", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "discoverer", "argument_pos": []}, {"argument": "the zero - day", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This is the second Windows elevation of privilege zero - day patched by Microsoft discovered by Kaspersky researchers .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Kaspersky researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Last month , Microsoft patched CVE -2018-8453 , another zero - day that had been used by a state - backed cyber-espionage group known as FruityArmor .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Last month", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "CVE -2018-8453", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "another zero - day", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "However , in this month ’s Patch Tuesday , Microsoft has not patched a zero - day that is affecting the Windows Data Sharing Service ( dssvc.dll ) .", "event": [{"event_trigger": "has not patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a zero - day", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "This zero - day was disclosed on Twitter at the end of October .", "event": [{"event_trigger": "was disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "This zero - day", "role": "vulnerability", "argument_pos": []}, {"argument": "the end of October", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft also announced the re-release of Windows Server 2019 , which was affected by the same issue .", "event": [{"event_trigger": "was affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows Server 2019", "role": "vulnerable system", "argument_pos": []}, {"argument": "issue", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "An exploit discovered by a pair of security researchers allowed them to hack an iPhone X and access a photo that was supposedly deleted from the device .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security researchers", "role": "discoverer", "argument_pos": []}, {"argument": "hack an iPhone X and access a photo", "role": "capabilities", "argument_pos": []}, {"argument": "exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Apple was informed of the security hole and a fix is on the way .", "event": [{"event_trigger": "was informed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the security hole", "role": "vulnerability", "argument_pos": []}, {"argument": "a fix", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "As first reported by Forbes , hackers Richard Zhu and Amat Cama teamed up and discovered the hole that allowed access to deleted files on iOS devices running iOS 12 .", "event": [{"event_trigger": "first reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Forbes", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerablitiy is found in a just - in - time compiler .", "event": [{"event_trigger": "is found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerablitiy", "role": "vulnerability", "argument_pos": []}, {"argument": "compiler", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "While developers can continue fixing bugs , there ’s no guarantee new holes wo n’t emerge .", "event": [{"event_trigger": "fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "developers", "role": "releaser", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The pair earned the “ Master of Pwn ” title for discovering the iPhone vulnerability along with several other exploits showcased during the event .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the iPhone vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "exploits", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Apple should have this exploit patched within the next few weeks .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "the next few weeks", "role": "time", "argument_pos": []}, {"argument": "exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The company will likely patch this in the next beta version of iOS 12.1.1 .", "event": [{"event_trigger": "will likely patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The company", "role": "releaser", "argument_pos": []}, {"argument": "next beta version", "role": "patch number", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "12.1.1", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Media Prima Berhad 's computer systems have been locked out by cyber attackers who are demanding millions of ringgit in ransom .", "event": [{"event_trigger": "are demanding", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "cyber attackers", "role": "attacker", "argument_pos": []}, {"argument": "Media Prima Berhad", "role": "victim", "argument_pos": []}, {"argument": "computer systems", "role": "victim", "argument_pos": []}, {"argument": "have been locked out", "role": "attack pattern", "argument_pos": []}, {"argument": "millions of ringgit", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "The media company , which runs a stable of TV and radio channels , newspapers , advertising and digital media companies was hit by a ransomware attack last Thursday ( Nov 8 ) , The Edge Financial Daily reported .", "event": [{"event_trigger": "was hit by a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "digital media companies", "role": "victim", "argument_pos": []}, {"argument": "media company", "role": "victim", "argument_pos": []}, {"argument": "last Thursday ( Nov 8 )", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Ransomware is a type of malicious software ( malware ) designed to block access to a computer system until a sum of money is paid .", "event": [{"event_trigger": "money is paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "computer system", "role": "victim", "argument_pos": []}, {"argument": "designed to block access", "role": "attack pattern", "argument_pos": []}, {"argument": "malicious software ( malware )", "role": "tool", "argument_pos": []}, {"argument": "Ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The report , quoting a source , said the attackers are demanding 1,000 bitcoins to release access to the computer systems .", "event": [{"event_trigger": "are demanding", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the computer systems", "role": "victim", "argument_pos": []}, {"argument": "1,000 bitcoins", "role": "price", "argument_pos": []}, {"argument": "attackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "This means that the attackers are demanding a ransom of RM 26.42 million ( S$ 8.71 million ) .", "event": [{"event_trigger": "are demanding a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "RM 26.42 million", "role": "price", "argument_pos": []}, {"argument": "S$ 8.71 million", "role": "price", "argument_pos": []}, {"argument": "the attackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "When contacted , Media Prima group managing director , Datuk Kamal Khalid , declined to comment when asked to confirm whether the company has been hit by ransomware .", "event": [{"event_trigger": "has been hit", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "company", "role": "victim", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The Edge Financial Daily report said it was not immediately known whether Media Prima 's data has been breached , and whether the media group would be suffering financial losses due to the ransomware attack .", "event": [{"event_trigger": "has been breached", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "Media Prima", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The source reportedly added that Media Prima has decided not to pay the ransom .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Media Prima", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Ransomware creators have attacked Malaysian media giant Media Prima Bhd and are demanding bitcoins before they can allow access to the company ’s compromised computer systems .", "event": [{"event_trigger": "have attacked", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Malaysian media giant Media Prima Bhd", "role": "victim", "argument_pos": []}, {"argument": "Ransomware creators", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The hackers are now demanding 1,000 bitcoins , translating to approximately US$ 6.3 million at current market prices , to reauthorize access .", "event": [{"event_trigger": "are now demanding", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The hackers", "role": "attacker", "argument_pos": []}, {"argument": "1,000 bitcoins", "role": "price", "argument_pos": []}, {"argument": "US$ 6.3 million", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "Media Prima did not , however , confirm the attack though sources indicated that the publicly listed company would not be paying the ransom .", "event": [{"event_trigger": "would not be paying the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the publicly listed company", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Some of the high - profile victims of ransomware attacks in the recent past have included the Port of San Diego .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the high - profile victims", "role": "victim", "argument_pos": []}, {"argument": "the Port of San Diego", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "While the Californian port did not reveal the amount that the hackers demanded , it was serious enough that it got the U.S. Federal Bureau of Investigations , the U.S. Department of Homeland Security and the U.S. Coast Guard involved .", "event": [{"event_trigger": "demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the hackers", "role": "attacker", "argument_pos": []}, {"argument": "the Californian port", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The Port can also now confirm that the ransom note requested payment in Bitcoin , although the amount that was requested is not being disclosed , ” a statement from the Port of San Diego read , as CCN reported at the time .", "event": [{"event_trigger": "requested payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "in Bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "the ransom note", "role": "tool", "argument_pos": []}, {"argument": "The Port", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A bloke has told how he discovered a bug in Valve 's Steam marketplace that could have been exploited by thieves to steal game license keys and play pirated titles .", "event": [{"event_trigger": "been exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "steal game license keys and play pirated titles", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Researcher Artem Moskowsky told The Register earlier this week that he stumbled across the vulnerability – which earned him a $ 20,000 bug bounty for reporting it – by accident while looking over the Steam partner portal .", "event": [{"event_trigger": "stumbled", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Researcher Artem Moskowsky", "role": "discoverer", "argument_pos": []}, {"argument": "earlier this week", "role": "time", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A professional bug - hunter and pentester , Moskowsky said he has been doing security research since he was in school , and for the past several years , he has made a career out of finding and reporting flaws .", "event": [{"event_trigger": "finding and reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "Moskowsky", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" This bug was discovered randomly during the exploration of the functionality of a web application , \" Moskowsky explained .", "event": [{"event_trigger": "explained", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Moskowsky", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The programming blunder has since been fixed .", "event": [{"event_trigger": "has since been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The programming blunder", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As the HackerOne entry for the vulnerability shows , Moskowsky first submitted the report on the flaw in early August .", "event": [{"event_trigger": "submitted the report", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Moskowsky", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "early August", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Back in July he was given a cool $ 25,000 for weeding out a SQL Injection bug in the same developer portal .", "event": [{"event_trigger": "weeding out", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "July", "role": "time", "argument_pos": []}, {"argument": "a SQL Injection bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco Systems yesterday issued 17 security advisories , disclosing vulnerabilities in multiple products , including at least three critical flaws .", "event": [{"event_trigger": "disclosing", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco Systems", "role": "discoverer", "argument_pos": []}, {"argument": "yesterday", "role": "time", "argument_pos": []}, {"argument": "multiple products", "role": "vulnerable system", "argument_pos": []}, {"argument": "three critical flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "One of them , a privileged access bug found in seven models of its Small Business Switches , has not yet been patched , but the company has recommended a workaround to limit its potential for damage .", "event": [{"event_trigger": "found in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a privileged access bug", "role": "vulnerability", "argument_pos": []}, {"argument": "models", "role": "vulnerable system", "argument_pos": []}, {"argument": "its Small Business Switches", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The other critical flaws confirmed in Cisco products were an authentication bypass vulnerability in the Stealthwatch Management Console of Cisco Stealthwatch Enterprise and a remote shell command execution bug in Unity Express .", "event": [{"event_trigger": "confirmed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The other critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco products", "role": "vulnerable system", "argument_pos": []}, {"argument": "an authentication bypass vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Unity Express", "role": "vulnerable system", "argument_pos": []}, {"argument": "a remote shell command execution bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco Stealthwatch Enterprise", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Stealthwatch Management Console", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco published a fourth critical advisory warning of a remote code execution bug in the Apache Struts Commons FileUpload Library ; however , it is unknown at this time if any Cisco products and services are affected .", "event": [{"event_trigger": "warning", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a remote code execution bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the Apache Struts Commons FileUpload Library", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Additional vulnerabilities were found in the Cisco ’s Meraki networking devices , Video Surveillance Media Server , Content Security Management Appliance , Registered Envelope Service , Price Service Catalog , Prime Collaboration Assurance , Meeting Server , Immunet and AMP for Endpoints , Firepower System Software , Energy Management Suite and Integrated Management Controller Supervisor .", "event": [{"event_trigger": "were found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Additional vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Meraki networking devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "Video Surveillance Media Server", "role": "vulnerable system", "argument_pos": []}, {"argument": "Content Security Management Appliance", "role": "vulnerable system", "argument_pos": []}, {"argument": "Integrated Management Controller Supervisor", "role": "vulnerable system", "argument_pos": []}, {"argument": "Energy Management Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firepower System Software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Immunet and AMP for Endpoints", "role": "vulnerable system", "argument_pos": []}, {"argument": "Meeting Server", "role": "vulnerable system", "argument_pos": []}, {"argument": "Prime Collaboration Assurance", "role": "vulnerable system", "argument_pos": []}, {"argument": "Price Service Catalog", "role": "vulnerable system", "argument_pos": []}, {"argument": "Registered Envelope Service", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "“ The presence of the sample , dormant exploit code does not represent nor allow an exploitable vulnerability on the product , nor does it present a risk to the product itself as all of the required patches for this vulnerability have been integrated into all shipping software images , ” said the advisory .", "event": [{"event_trigger": "have been integrated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the required patches", "role": "patch", "argument_pos": []}, {"argument": "shipping software images", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "“ The affected software images have proactively been removed from the Cisco Software Center and will soon be replaced with fixed software images . ”", "event": [{"event_trigger": "will soon be replaced", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixed software images", "role": "patch", "argument_pos": []}, {"argument": "The affected software images", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Google has announced a crackdown on intrusive pop - up advertisements on its Chrome web browser after a previous update failed to stop them .", "event": [{"event_trigger": "failed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a previous update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The ads open users up to phishing attacks that attempt to scam people into giving private information such as bank details to online fraudsters .", "event": [{"event_trigger": "phishing attacks", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Google says the ads create an ' abusive experience for users ' , including fee messages , unexpected clicks , phishing attempts and misleading site behaviour .", "event": [{"event_trigger": "phishing attempts", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The firm tried to stop manipulative adverts in an update last February but now admits that it ' did not go far enough ' .", "event": [{"event_trigger": "tried to stop", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The firm", "role": "releaser", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "last February", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The company declined to name the companies involved in the crackdown but said that the update will block ads from a ' small number of sites with persistent abusive problems ' .", "event": [{"event_trigger": "will block", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the update", "role": "patch", "argument_pos": []}, {"argument": "persistent abusive problems", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Advertisements also tend to be a hotbed for malicious software or scams where fraudsters trick people into giving out their personal information .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "people", "role": "victim", "argument_pos": []}, {"argument": "giving out their personal information", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers at cybersecurity company Check Point have today shared details of a vulnerability in DJI ’s infrastructure that could have given hackers access to consumer and corporate user accounts , personal data , flight logs , photos , videos , and – if the user was flying with DJI ’s FlightHub application – a live camera feed and map during missions .", "event": [{"event_trigger": "shared details", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "today", "role": "time", "argument_pos": []}, {"argument": "cybersecurity company Check Point", "role": "discoverer", "argument_pos": []}, {"argument": "Researchers", "role": "discoverer", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "hackers access to consumer and corporate user accounts", "role": "capabilities", "argument_pos": []}, {"argument": "FlightHub application", "role": "vulnerable system", "argument_pos": []}, {"argument": "DJI", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "infrastructure", "role": "vulnerable system", "argument_pos": []}, {"argument": "DJI", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Check Point submitted a report to DJI ’s Bug Bounty Program , highlighting a process in which an attacker could have gained access to a user ’s account through a vulnerability discovered in the user identification process within DJI Forum .", "event": [{"event_trigger": "submitted a report", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Check Point", "role": "discoverer", "argument_pos": []}, {"argument": "DJI", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Check Point ’s researchers found that DJI ’s various platforms used a token to identify registered users across different aspects of the customer experience .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "various platforms", "role": "vulnerable system", "argument_pos": []}, {"argument": "DJI", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Check Point", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "A user who logged into DJI Forum , then clicked a specially - planted malicious link , could have had his or her login credentials stolen to allow access to other DJI online assets : DJI ’s web platform ( account , store , forum ) Cloud server data synced from DJI ’s GO or GO 4 pilot apps DJI ’s FlightHub ( centralized drone operations management platform ) We notified DJI about this vulnerability in March 2018 and DJI responded responsibly .", "event": [{"event_trigger": "notified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "March 2018", "role": "time", "argument_pos": []}, {"argument": "We", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability has since been patched .", "event": [{"event_trigger": "has since been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "DJI classified this vulnerability as high risk but low probability , and indicated there is no evidence this vulnerability was ever exploited by anyone other than Check Point researchers .", "event": [{"event_trigger": "classified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "DJI", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The school district said a virus entered their network through phishing emails sent to employees .", "event": [{"event_trigger": "sent to", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "employees", "role": "victim", "argument_pos": []}, {"argument": "a virus entered their network", "role": "purpose", "argument_pos": []}, {"argument": "The school district", "role": "victim", "argument_pos": []}, {"argument": "phishing emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "A Russian vulnerability researcher and exploit developer has published detailed information about a zero - day vulnerability in VirtualBox .", "event": [{"event_trigger": "has published", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A Russian vulnerability researcher", "role": "discoverer", "argument_pos": []}, {"argument": "a zero - day vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "VirtualBox", "role": "vulnerable system", "argument_pos": []}, {"argument": "exploit developer", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "According to the initial details in the disclosure , the issue is present in a shared code base of the virtualization software , available on all supported operating systems .", "event": [{"event_trigger": "the disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "supported operating systems", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Exploiting the vulnerability allows an attacker to escape the virtual environment of the guest machine and reach the Ring 3 privilege layer , used for running code from most user programs , with the least privileges .", "event": [{"event_trigger": "Exploiting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "allows an attacker to escape the virtual environment", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Turning one \" overflow \" into another Sergey Zelenyuk found that the security bug can be leveraged on virtual machines configured with the Intel PRO / 1000 MT Desktop ( 82540EM ) network adapter in Network Address Translation ( NAT ) mode , the default setup that allows the guest system to access external networks .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Sergey Zelenyuk", "role": "discoverer", "argument_pos": []}, {"argument": "the security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "leveraged on virtual machines configured", "role": "capabilities", "argument_pos": []}, {"argument": "Network Address Translation ( NAT ) mode", "role": "vulnerable system", "argument_pos": []}, {"argument": "allows the guest system to access external networks", "role": "capabilities", "argument_pos": []}, {"argument": "the Intel PRO / 1000 MT Desktop ( 82540EM ) network adapter", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Then the attacker can use existing techniques to escalate privileges to ring 0 via / dev / vboxdrv , \" Zelenyuk writes in a technical write - up on Tuesday .", "event": [{"event_trigger": "writes", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Zelenyuk", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla has recently fixed multiple security flaws in its Thunderbird 60.3 email client .", "event": [{"event_trigger": "has recently fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "multiple security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "60.3", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "These vulnerabilities also include a critical security bug that allegedly affected Mozilla ’s Firefox and Firefox ESR browsers as well .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "These vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox ESR browsers", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mozilla", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Last week , Mozilla patched multiple security flaws altogether in its latest Thunderbird 60.3 including a critical security flaw .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "multiple security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "a critical security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "60.3", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Last week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "As explained in Mozilla ’s security advisory , numerous community members and developers at Mozilla discovered reported memory safety bugs that only affected Thunderbird email client , but also had impacted Firefox and Firefox ESR .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Thunderbird email client", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Describing the bugs ( CVE -2018-12390 ) , Mozilla stated , Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "run arbitrary code", "role": "capabilities", "argument_pos": []}, {"argument": "memory corruption", "role": "capabilities", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla has fixed the bugs in Firefox 63 , Firefox ESR 60.3 , and Thunderbird 60.3 respectively .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "the bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox ESR", "role": "vulnerable system", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "63", "role": "vulnerable system version", "argument_pos": []}, {"argument": "60.3", "role": "vulnerable system version", "argument_pos": []}, {"argument": "60.3", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Apart from the critical memory safety bugs , Mozilla also released fixes for several other vulnerabilities affecting Thunderbird .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mozilla", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "With regards to the conditions for the exploit , Mozilla elaborated , In general , these flaws can not be exploited through email in the Thunderbird product because scripting is disabled when reading mail , but are potentially risks in browser or browser - like contexts .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "browser", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla patched multiple vulnerabilities in the previous versions of Thunderbird and Firefox last month .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "multiple vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "last month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "That time too , Mozilla released a fix for critical code execution vulnerability affecting Thunderbird 60.2 , Firefox 61 and Firefox ESR 60.1 .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "critical code execution vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Thunderbird", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox ESR", "role": "vulnerable system", "argument_pos": []}, {"argument": "60.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "60.2", "role": "vulnerable system version", "argument_pos": []}, {"argument": "61", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The announcement came just a day after a security researcher in France posted screenshots on Twitter of the purported stolen data .", "event": [{"event_trigger": "posted", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "stolen data", "role": "compromised data", "argument_pos": []}, {"argument": "a security researcher", "role": "attacker", "argument_pos": []}, {"argument": "France", "role": "place", "argument_pos": []}, {"argument": "screenshots", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "\" The data breach has had no impact on Austal 's ongoing operations , \" the company says .", "event": [{"event_trigger": "The data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Austal", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The breach exposed ship design drawings that are distributed to customers , fabrication subcontractors and suppliers , Austal says .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "ship design drawings", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "It also exposed \" some staff email addresses and mobile phone numbers . \"", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "staff email addresses", "role": "compromised data", "argument_pos": []}, {"argument": "mobile phone numbers", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Companies are increasingly being subjected to ransoms by hackers after their networks have been breached .", "event": [{"event_trigger": "been breached", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "their networks", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Ransoms put companies in tough positions : risk public exposure of potentially embarrassing data , or risk paying a ransom and still face a chance the data could be released anyway .", "event": [{"event_trigger": "Ransoms", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "companies", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Security experts and law enforcement generally advise against paying ransoms , even after incidents of file - encrypting malware .", "event": [{"event_trigger": "paying ransoms", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "file - encrypting malware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Late last month in the U.S , the city of West Haven , Connecticut , paid $ 2,000 to unlock 23 servers that had been infected with ransomware ( see : Connecticut City Pays Ransom After Crypto - Locking Attack ) .", "event": [{"event_trigger": "Pays Ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Crypto - Locking Attack", "role": "attack pattern", "argument_pos": []}, {"argument": "Connecticut City", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A former Chicago Public Schools worker faces several felony charges after officials allege the worker stole personal information on about 80,000 employees , volunteers and vendors from a CPS database .", "event": [{"event_trigger": "stole", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the worker", "role": "attacker", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}, {"argument": "employees", "role": "victim", "argument_pos": []}, {"argument": "volunteers", "role": "victim", "argument_pos": []}, {"argument": "vendors", "role": "victim", "argument_pos": []}, {"argument": "worker", "role": "attacker", "argument_pos": []}, {"argument": "a CPS database", "role": "compromised data", "argument_pos": []}, {"argument": "80,000", "role": "number of victim", "argument_pos": []}, {"argument": "Chicago Public Schools", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "In a letter to employees Thursday evening , CPS Chief Operating Officer Arnie Rivera said the district learned of the massive data breach Wednesday , the day after the information was stolen .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Wednesday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Among the data stolen were names , employee ID numbers , phone numbers , addresses , dates of birth , criminal arrest histories and DCFS findings .", "event": [{"event_trigger": "the data stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "DCFS findings", "role": "compromised data", "argument_pos": []}, {"argument": "criminal arrest histories", "role": "compromised data", "argument_pos": []}, {"argument": "dates of birth", "role": "compromised data", "argument_pos": []}, {"argument": "addresses", "role": "compromised data", "argument_pos": []}, {"argument": "phone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "employee ID numbers", "role": "compromised data", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Social Security numbers were not taken , Rivera said .", "event": [{"event_trigger": "were not taken", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Social Security numbers", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "CPD spokesman Anthony Guglielmi said Sims is also suspected of deleting the targeted files from the CPS database after they were stolen .", "event": [{"event_trigger": "were stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "they", "role": "compromised data", "argument_pos": []}, {"argument": "Sims", "role": "attacker", "argument_pos": []}, {"argument": "deleting the targeted files", "role": "purpose", "argument_pos": []}, {"argument": "the CPS database", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "This latest CPS data breach comes only a few months after the school district mistakenly sent a mass email that linked to the private information of thousands of students and families .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "few months", "role": "time", "argument_pos": []}, {"argument": "CPS", "role": "victim", "argument_pos": []}, {"argument": "families", "role": "victim", "argument_pos": []}, {"argument": "students", "role": "victim", "argument_pos": []}, {"argument": "thousands", "role": "number of victim", "argument_pos": []}, {"argument": "private information", "role": "compromised data", "argument_pos": []}, {"argument": "the school district", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In that incident , CPS apologized for the “ unacceptable breach of both student information and your trust ” and asked recipients of the email to delete the sensitive information .", "event": [{"event_trigger": "breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "student information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Radisson Hotel Group has confirmed that it has suffered a data breach on affecting “ a small percentage of our Radisson Rewards members ” .", "event": [{"event_trigger": "a data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Radisson Hotel Group", "role": "victim", "argument_pos": []}, {"argument": "it", "role": "victim", "argument_pos": []}, {"argument": "Radisson Rewards members", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Business Traveller was alerted to the incident by one of our readers , who had received an email from Radisson confirming that his details had been compromised .", "event": [{"event_trigger": "had been compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "his details", "role": "compromised data", "argument_pos": []}, {"argument": "one of our readers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A statement on the group ’s website states : “ This data security incident did not compromise any credit card or password information .", "event": [{"event_trigger": "compromise", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "credit card", "role": "compromised data", "argument_pos": []}, {"argument": "password information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Our ongoing investigation has determined that the information accessed was restricted to member name , address ( including country of residence ) , email address , and in some cases , company name , phone number , Radisson Rewards member number and any frequent flyer numbers on file .", "event": [{"event_trigger": "information accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "frequent flyer numbers", "role": "compromised data", "argument_pos": []}, {"argument": "Radisson Rewards member number", "role": "compromised data", "argument_pos": []}, {"argument": "phone number", "role": "compromised data", "argument_pos": []}, {"argument": "company name", "role": "compromised data", "argument_pos": []}, {"argument": "member name", "role": "compromised data", "argument_pos": []}, {"argument": "address", "role": "compromised data", "argument_pos": []}, {"argument": "email address", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "You should also be aware that third parties may claim to be Radisson Rewards and attempt to gather personal information by deception ( known as “ phishing ” ) , including through the use of links to fake websites .", "event": [{"event_trigger": "claim to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "third parties", "role": "attacker", "argument_pos": []}, {"argument": "gather personal information", "role": "purpose", "argument_pos": []}, {"argument": "deception", "role": "attack pattern", "argument_pos": []}, {"argument": "through the use of links to fake websites", "role": "attack pattern", "argument_pos": []}, {"argument": "Radisson Rewards", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "In the FAQs Radisson stresses that credit card data was not exposed by the breach , nor were members ’ passwords or travel histories / future stays .", "event": [{"event_trigger": "exposed by the breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "credit card data", "role": "compromised data", "argument_pos": []}, {"argument": "passwords", "role": "compromised data", "argument_pos": []}, {"argument": "travel histories", "role": "compromised data", "argument_pos": []}, {"argument": "future stays", "role": "compromised data", "argument_pos": []}, {"argument": "members", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The hotel group is the latest in a line of travel companies to suffer data breaches , with British Airways and Cathay Pacific both admitting to compromised data in the last couple of months .", "event": [{"event_trigger": "data breaches", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "hotel group", "role": "victim", "argument_pos": []}, {"argument": "travel companies", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The Legislative Council has decided to take action on the massive data breach at Cathay Pacific Airways , which has affected the personal information of as many as 9.4 million customers .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the personal information", "role": "compromised data", "argument_pos": []}, {"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "9.4 million", "role": "number of victim", "argument_pos": []}, {"argument": "Cathay Pacific Airways", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Cathay revealed on Oct 23 that it discovered suspicious activity on its computer network in early March and confirmed in early May that personal data of its customers were accessed with no authorization .", "event": [{"event_trigger": "were accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "its computer network", "role": "victim", "argument_pos": []}, {"argument": "early March", "role": "time", "argument_pos": []}, {"argument": "personal data", "role": "compromised data", "argument_pos": []}, {"argument": "its customers", "role": "victim", "argument_pos": []}, {"argument": "Cathay", "role": "victim", "argument_pos": []}, {"argument": "Oct 23", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "It is understood that the police force has instructed all of its districts to pay attention to cases that may be connected to the data breach or those resulting in material losses .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Eurostar confirmed that credit card details and payment details were not compromised because the company does not store that information online .", "event": [{"event_trigger": "were not compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "payment details", "role": "compromised data", "argument_pos": []}, {"argument": "credit card details", "role": "compromised data", "argument_pos": []}, {"argument": "Eurostar", "role": "victim", "argument_pos": []}, {"argument": "company", "role": "victim", "argument_pos": []}, {"argument": "information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Eurostar has yet to confirm how many people have been affected by this data breach or whether any data has been taken .", "event": [{"event_trigger": "this data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The company has reported the data breach to the Information Commissioner 's Office .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "company", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "\" We have taken this action as a precaution because we identified what we believe to be an unauthorised automated attempt to access eurostar.com accounts using your email address and password , \" the company told customers .", "event": [{"event_trigger": "access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "eurostar.com", "role": "victim", "argument_pos": []}, {"argument": "accounts", "role": "compromised data", "argument_pos": []}, {"argument": "using your email address and password", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "If you did n't log in during this period , there 's a possibility your account was accessed by this unauthorised attempt .", "event": [{"event_trigger": "was accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "your account", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "We deliberately never store any payment details or bank card information , so there is no possibility of those being compromised .", "event": [{"event_trigger": "being compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "bank card information", "role": "compromised data", "argument_pos": []}, {"argument": "payment details", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "\" An ICO spokesman said : “ We ’ve received data breach report from Eurostar and are making enquiries . ”", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Eurostar", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Last week , British Airways revealed that almost 200,000 further passengers may have had their personal data stolen by hackers in the September attack in what experts described as one of the biggest breaches of consumer data the UK had ever seen .", "event": [{"event_trigger": "stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "passengers", "role": "victim", "argument_pos": []}, {"argument": "British Airways", "role": "victim", "argument_pos": []}, {"argument": "personal data", "role": "compromised data", "argument_pos": []}, {"argument": "200,000", "role": "number of victim", "argument_pos": []}, {"argument": "Last week", "role": "time", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "A security bug in Systemd can be exploited over the network to , at best , potentially crash a vulnerable Linux machine , or , at worst , execute malicious code on the box .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Systemd", "role": "vulnerable system", "argument_pos": []}, {"argument": "security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the network", "role": "vulnerable system", "argument_pos": []}, {"argument": "Linux machine", "role": "supported platform", "argument_pos": []}, {"argument": "execute malicious code", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability – which was made public this week – sits within the written - from - scratch DHCPv6 client of the open - source Systemd management suite , which is built into various flavors of Linux .", "event": [{"event_trigger": "was made public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "the written - from - scratch DHCPv6 client", "role": "vulnerable system", "argument_pos": []}, {"argument": "the open - source Systemd management suite", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Here 's the Red Hat Linux summary : systemd - networkd is vulnerable to an out - of - bounds heap write in the DHCPv6 client when handling options sent by network adjacent DHCP servers .", "event": [{"event_trigger": "is vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the DHCPv6 client", "role": "vulnerable system", "argument_pos": []}, {"argument": "systemd - networkd", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Felix Wilhelm , of the Google Security team , was credited with discovering the flaw , designated CVE -2018-15688 .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Google Security team", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15688", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Felix Wilhelm", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Systemd creator Lennart Poettering has already published a security fix for the vulnerable component – this should be weaving its way into distros as we type .", "event": [{"event_trigger": "has already published", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Systemd creator Lennart Poettering", "role": "releaser", "argument_pos": []}, {"argument": "a security fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "If you run a Systemd - based Linux system , and rely on systemd - networkd , update your operating system as soon as you can to pick up the fix when available and as necessary .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "your operating system", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "A phishing campaign is targeting customers of every major UK bank , with cybercriminals posing as customer support staff on Twitter in an attempt to steal users ' online banking credentials .", "event": [{"event_trigger": "A phishing campaign", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "major UK bank", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Easy to carry out but difficult to defend against , phishing is an increasingly popular weapon of choice for hackers .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "That 's because , with an authentic - looking fake website , they can just sit back and scoop up data as victims unwittingly hand over their usernames and passwords .", "event": [{"event_trigger": "scoop up", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "an authentic - looking fake website", "role": "tool", "argument_pos": []}, {"argument": "hand over their usernames and passwords", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Phishing often relies on cybercriminals sending tailored emails to potential victims in an effort to lure them into giving up credentials or installing malware .", "event": [{"event_trigger": "sending", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "tailored emails", "role": "tool", "argument_pos": []}, {"argument": "potential victims", "role": "victim", "argument_pos": []}, {"argument": "cybercriminals", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "However , cybersecurity researchers at Proofpoint have uncovered an Angler phishing campaign which , rather than being tailored to specific users , takes advantage of how they can often be careless on social media -- specifically Twitter .", "event": [{"event_trigger": "being tailored", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "specific users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "This sort of phishing attack is unlikely to provide cybercriminals with the big score they 'd hit if they targeted a corporate network , but it does enable the easy theft of credentials and small amounts of money -- and repeated success could become lucrative , and also provide criminals with access to other types of data which can be used to commit fraud .", "event": [{"event_trigger": "phishing attack", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "cybercriminals", "role": "attacker", "argument_pos": []}, {"argument": "enable the easy theft of credentials and small amounts of money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "\" In many of the examples we 've seen , the hacker is not just collecting banking credentials .", "event": [{"event_trigger": "collecting", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "banking credentials", "role": "compromised data", "argument_pos": []}, {"argument": "the hacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Fortunately , there are some simple things users can do to ensure they do n't become victims of this style of social media phishing attack .", "event": [{"event_trigger": "phishing attack", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The Privacy Commissioner for Personal Data , Hong Kong ( Privacy Commissioner ) , Mr Stephen Kai - yi WONG , expressed serious concern over the Cathay Pacific Airways data breach incident , noting that the incident might involve a vast amount of personal data ( such as name , date of birth , passport number , Hong Kong Identity Card number , credit card number , etc ) of local and foreign citizens .", "event": [{"event_trigger": "the incident", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "personal data", "role": "compromised data", "argument_pos": []}, {"argument": "local and foreign citizens", "role": "victim", "argument_pos": []}, {"argument": "credit card number", "role": "compromised data", "argument_pos": []}, {"argument": "Hong Kong Identity Card number", "role": "compromised data", "argument_pos": []}, {"argument": "passport number", "role": "compromised data", "argument_pos": []}, {"argument": "name", "role": "compromised data", "argument_pos": []}, {"argument": "date of birth", "role": "compromised data", "argument_pos": []}, {"argument": "a vast amount", "role": "number of data", "argument_pos": []}]}], "task": "EE"} {"text": "Mr Wong stated that while reporting of data breach is voluntary , any organisation concerned is encouraged to notify the PCPD .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "HONG KONG ( REUTERS ) - Cathay Pacific Airways said on Wednesday ( Oct 24 ) that data of about 9.4 million passengers of Cathay and its unit Hong Kong Dragon Airlines had been accessed without authorisation .", "event": [{"event_trigger": "had been accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "9.4 million", "role": "number of victim", "argument_pos": []}, {"argument": "Hong Kong Dragon Airlines", "role": "victim", "argument_pos": []}, {"argument": "Cathay", "role": "victim", "argument_pos": []}, {"argument": "passengers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Cathay said 860,000 passport numbers , about 245,000 Hong Kong identity card numbers , 403 expired credit card numbers and 27 credit card numbers with no card verification value ( CVV ) were accessed in the breach .", "event": [{"event_trigger": "were accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "credit card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "860,000", "role": "number of data", "argument_pos": []}, {"argument": "245,000", "role": "number of data", "argument_pos": []}, {"argument": "403", "role": "number of data", "argument_pos": []}, {"argument": "27", "role": "number of data", "argument_pos": []}, {"argument": "passport numbers", "role": "compromised data", "argument_pos": []}, {"argument": "Hong Kong identity card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "expired credit card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "card verification value ( CVV )", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Mr Hogg said no passwords were compromised in the breach and the company was contacting affected passengers to give them information on how to protect themselves .", "event": [{"event_trigger": "the breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "company", "role": "victim", "argument_pos": []}, {"argument": "passengers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The company said it initially discovered suspicious activity on its network in March this year , and investigations in early May confirmed that certain personal data had been accessed .", "event": [{"event_trigger": "had been accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "personal data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "News of Cathay 's passenger data breach comes weeks after British Airways revealed that credit card details of hundreds of thousands of its customers were stolen over a two - week period .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "weeks after", "role": "time", "argument_pos": []}, {"argument": "passenger", "role": "victim", "argument_pos": []}, {"argument": "Cathay", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Cathay said in a statement that accessed data includes names of passengers , their nationalities , dates of birth , telephone numbers , e-mail and physical addresses , passport numbers , identity card numbers and historical travel information .", "event": [{"event_trigger": "accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "passengers", "role": "victim", "argument_pos": []}, {"argument": "dates of birth ,", "role": "compromised data", "argument_pos": []}, {"argument": "telephone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "e-mail", "role": "compromised data", "argument_pos": []}, {"argument": "historical travel information", "role": "compromised data", "argument_pos": []}, {"argument": "identity card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "passport numbers", "role": "compromised data", "argument_pos": []}, {"argument": "physical addresses", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "It added that the Hong Kong Police had been notified about the breach and that there is no evidence any personal information has been misused .", "event": [{"event_trigger": "breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "personal information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Members of the Girl Scouts of Orange County were notified this week that their personal information may have been exposed to an unknown party who gained access to an organization email account last month , according to a letter sent to members .", "event": [{"event_trigger": "have been exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "an unknown party", "role": "attacker", "argument_pos": []}, {"argument": "their personal information", "role": "compromised data", "argument_pos": []}, {"argument": "Members", "role": "victim", "argument_pos": []}, {"argument": "the Girl Scouts of Orange County", "role": "victim", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The organization sent the letter Tuesday to about 2,800 members who may have been affected by the data breach .", "event": [{"event_trigger": "the data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "members", "role": "victim", "argument_pos": []}, {"argument": "2,800", "role": "number of victim", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Christina Salcido , vice president of mission operations , said members ’ names , birth dates , home addresses , insurance policy numbers and health history information could have been accessed from Sept 30 to Oct 1 .", "event": [{"event_trigger": "have been accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "from Sept 30 to Oct 1", "role": "time", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "birth dates", "role": "compromised data", "argument_pos": []}, {"argument": "home addresses", "role": "compromised data", "argument_pos": []}, {"argument": "insurance policy numbers", "role": "compromised data", "argument_pos": []}, {"argument": "health history information", "role": "compromised data", "argument_pos": []}, {"argument": "members", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The results of an annual school survey administered by Western Albemarle High School ( WAHS ) were inadvertently exposed to the public in a serious breach of security and student privacy protocol .", "event": [{"event_trigger": "inadvertently exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "results", "role": "compromised data", "argument_pos": []}, {"argument": "Western Albemarle High School ( WAHS )", "role": "victim", "argument_pos": []}, {"argument": "an annual school survey", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Bonham continued by revealing that a change to the survey exposed presumed confidential names of students listed on the survey : The survey is administered electronically and this morning , a change was made to add questions having to do with student needs around technology .", "event": [{"event_trigger": "the survey exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "confidential names", "role": "compromised data", "argument_pos": []}, {"argument": "students", "role": "victim", "argument_pos": []}, {"argument": "the survey", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "While WAHS has given assurances that the names of those submitting data to the survey were not exposed , concerned parents , students , and teachers were not assuaged .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "submitting data", "role": "compromised data", "argument_pos": []}, {"argument": "the survey", "role": "compromised data", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "parents", "role": "victim", "argument_pos": []}, {"argument": "students", "role": "victim", "argument_pos": []}, {"argument": "teachers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A NEW DVLA car tax scam is doing the rounds online which could see motorists duped into entering sensitive information and being ripped off by criminals .", "event": [{"event_trigger": "A NEW DVLA car tax scam", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Criminals pose as the Driver and Vehicle Licensing Agency in a bid to extort motorists of their cash by requesting this bank details .", "event": [{"event_trigger": "pose as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Criminals", "role": "attacker", "argument_pos": []}, {"argument": "the Driver and Vehicle Licensing Agency", "role": "attacker", "argument_pos": []}, {"argument": "extort motorists of their cash", "role": "purpose", "argument_pos": []}, {"argument": "requesting this bank details", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The problem for some motorists could fall for the fraudulent messages especially as they often look fairly professional and can even contain the logo of the DVLA Motorists Jason Price , however , was not fooled by the latest attempt by fraudsters trying to get him to hand over his details .", "event": [{"event_trigger": "fall", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the fraudulent messages", "role": "tool", "argument_pos": []}, {"argument": "they", "role": "tool", "argument_pos": []}, {"argument": "the DVLA", "role": "trusted entity", "argument_pos": []}, {"argument": "motorists", "role": "victim", "argument_pos": []}, {"argument": "logo", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Mr Price tweeted a link to the email that he received from the criminal pretending to be the DVLA .", "event": [{"event_trigger": "received", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the email", "role": "tool", "argument_pos": []}, {"argument": "Mr Price", "role": "victim", "argument_pos": []}, {"argument": "he", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft issued numerous bug fixes on its most recent Patch Tuesday , but according to the security firm 0patch , there were issues with one of the flaws for a critical vulnerability .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "bug fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability in question , ( CVE -2018-8423 ) , is a memory corruption vulnerability that exists in the Jet Database Engine that , when exploited , allows for remote code execution .", "event": [{"event_trigger": "in question", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "0patch noticed that the patch Microsoft had issued was flawed as a result of studying the official patch of the Jet Database Engine and a “ micropatch ” that the security researchers had created for the same flaw .", "event": [{"event_trigger": "had issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "the patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "We promptly notified Microsoft about it and will not reveal further details or proof - of - concept until they issue a correct fix .", "event": [{"event_trigger": "issue", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "releaser", "argument_pos": []}, {"argument": "a correct fix", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "If the flaw is not public knowledge and has not been patched , it makes no sense to hand a cybercriminal the keys to Windows user ’s machines .", "event": [{"event_trigger": "has not been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Without the due diligence of first Trend Micro ’s ZDI discovering the original flaw , and then 0patch uncovering the secondary flaw in the patch , Microsoft and their customers would be exposed to hackers with bad intentions .", "event": [{"event_trigger": "uncovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "0patch", "role": "discoverer", "argument_pos": []}, {"argument": "the secondary flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A serious vulnerability in a widely used , and widely forked , jQuery file upload plugin may have been exploited for years by hackers to seize control of websites – and is only now patched .", "event": [{"event_trigger": "been exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "jQuery file upload plugin", "role": "vulnerable system", "argument_pos": []}, {"argument": "A serious vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "seize control of websites", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Larry Cashdollar , a bug - hunter at Akamai , explained late last week how the security shortcoming , designated CVE -2018-9206 , allows a miscreant to upload and execute arbitrary code as root on a website that uses the vulnerable code with the Apache web server .", "event": [{"event_trigger": "explained", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Larry Cashdollar", "role": "discoverer", "argument_pos": []}, {"argument": "late last week", "role": "time", "argument_pos": []}, {"argument": "Akamai", "role": "discoverer", "argument_pos": []}, {"argument": "a bug - hunter", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "This would potentially allow an attacker to , among other things , upload and run a webshell to execute commands on the target machine to steal data , change files , distribute malware , and so on .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Cashdollar – real name , he swears – was able to track the flaw down to Sebastian Tschan 's open - source jQuery File Upload tool , and got the developer to fix it in version 9.22.1 .", "event": [{"event_trigger": "track", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "open - source jQuery File Upload tool", "role": "vulnerable system", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Cashdollar", "role": "discoverer", "argument_pos": []}, {"argument": "Sebastian Tschan", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Additionally , Cashdollar noted , it is almost certain he was not the first person to come across this simple vulnerability .", "event": [{"event_trigger": "noted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cashdollar", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Demonstration videos on YouTube suggest similar flaws are known to miscreants , and have been targeted in some circles for years .", "event": [{"event_trigger": "are known", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "for years", "role": "time", "argument_pos": []}, {"argument": "similar flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Now that details of the vulnerability are public , exploit code has been produced , for example , here , and may be handy if you wish to test whether or not your website is vulnerable to CVE -2018-9206 .", "event": [{"event_trigger": "are public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "exploit code", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "West Haven officials said Thursday they paid the money to anonymous attackers through the digital currency Bitcoin .", "event": [{"event_trigger": "paid the money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "West Haven officials", "role": "victim", "argument_pos": []}, {"argument": "they", "role": "victim", "argument_pos": []}, {"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "the digital currency Bitcoin", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "A Connecticut city has paid USD 2,000 to restore access to its computer system after a ransomware attack .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "USD 2,000", "role": "price", "argument_pos": []}, {"argument": "its computer system", "role": "victim", "argument_pos": []}, {"argument": "A Connecticut city", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "West Haven officials said Thursday they paid the money to anonymous attackers through the digital currency bitcoin to unlock 23 servers and restore access to city data .", "event": [{"event_trigger": "paid the money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "they", "role": "victim", "argument_pos": []}, {"argument": "West Haven officials", "role": "victim", "argument_pos": []}, {"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "the digital currency bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The attack disabled servers early Tuesday morning , and city officials say it was contained by 5:30 PM Wednesday .", "event": [{"event_trigger": "The attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "early Tuesday morning", "role": "time", "argument_pos": []}, {"argument": "5:30 PM Wednesday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "City attorney Lee Tiernan says officials initially did n't want to pay the ransom , but research showed it was the best course of action .", "event": [{"event_trigger": "pay the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "officials", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The city says there 's no reason to believe data was compromised .", "event": [{"event_trigger": "was compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "For the second time in roughly a year , D - Link has failed to act on warnings from security researchers involving the company ’s routers .", "event": [{"event_trigger": "warnings", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "D - Link", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "security researchers", "role": "discoverer", "argument_pos": []}, {"argument": "routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "company", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The latest incident arose after Silesian University of Technology researcher Błazej Adamczyk contacted D - Link last May about three vulnerabilities affecting eight router models .", "event": [{"event_trigger": "contacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "D - Link", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "last May", "role": "time", "argument_pos": []}, {"argument": "Silesian University of Technology researcher Błazej Adamczyk", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Following the warning , D - Link patched two of the affected routers , but did not initially reveal how it would proceed for the remaining six models .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "D - Link", "role": "releaser", "argument_pos": []}, {"argument": "routers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "After further prompting from Adamczyk , D - Link revealed that the remaining six routers would not get a security patch because they were considered end - of - life models , leaving affected owners out in the cold .", "event": [{"event_trigger": "would not get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "a security patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "“ The D - Link models affected are the DWR - 116 , DWR - 140L , DWR - 512 , DWR - 640L , DWR - 712 , DWR - 912 , DWR - 921 , and DWR - 111 , six of which date from 2013 , with the DIR - 640L first appearing in 2012 and the DWR - 111 in 2014 , ” Naked Security reported .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The D - Link models", "role": "vulnerable system", "argument_pos": []}, {"argument": "2013", "role": "time", "argument_pos": []}, {"argument": "DWR - 111", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 921", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 912", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 712", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 640L", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 512", "role": "vulnerable system", "argument_pos": []}, {"argument": "DWR - 140L", "role": "vulnerable system", "argument_pos": []}, {"argument": "the DWR - 116", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As a result of this impasse , Adamczyk released details about the security flaws , following responsible security protocols after giving D - Link notice and the opportunity to address the issues .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issues", "role": "vulnerability", "argument_pos": []}, {"argument": "D - Link", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Of significance is that this is the second time in about a year that D - Link has failed to address security vulnerabilities affecting its products after being notified by researchers .", "event": [{"event_trigger": "has failed to address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "D - Link", "role": "releaser", "argument_pos": []}, {"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "its products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The security researcher noted that the new flaw arose after D - Link reported that it had fixed a prior security flaw .", "event": [{"event_trigger": "noted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The security researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Despite D - Link ’s spotty history with supporting older router models , the manufacturer is not alone in leaving routers unpatched .", "event": [{"event_trigger": "unpatched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "the manufacturer", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The American Consumer Institute reported that of the 186 routers it had tested , 155 contained firmware vulnerabilities .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the 186 routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "The American Consumer Institute", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In total , ACI discovered more than 32,000 known vulnerabilities in its study .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "ACI", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "“ Our analysis shows that , on average , routers contained 12 critical vulnerabilities and 36 high - risk vulnerabilities , across the entire sample , ” ACI noted in its report .", "event": [{"event_trigger": "contained", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "12 critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "36 high - risk vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "routers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "If the router is nearing its end of life , as in the case illustrated here , you may not get patches , regardless of how serious a security vulnerability may be .", "event": [{"event_trigger": "get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "a security vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Google 's Project Zero has again called Apple out for silently patching flaws .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Apple has secretly patched a bunch of high - severity bugs reported to it by Google 's Project Zero researchers .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Project Zero researchers", "role": "discoverer", "argument_pos": []}, {"argument": "Google", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The move has resulted in Google 's Project Zero once again calling Apple out for fixing iOS and macOS security flaws without documenting them in public security advisories .", "event": [{"event_trigger": "fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "iOS and macOS security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "While it 's good news that Apple beat Project Zero 's 90 - day deadline for patching or disclosing the bugs it finds , the group 's Ivan Fratric recently argued that the practice endangered users by not fully informing them why an update should be installed .", "event": [{"event_trigger": "disclosing", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This time the criticism comes from Project Zero 's Ian Beer , who 's been credited by Apple with finding dozens of serious security flaws in iOS and macOS over the years .", "event": [{"event_trigger": "finding", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "dozens of serious security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "macOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Apple", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Ian Beer ,", "role": "discoverer", "argument_pos": []}, {"argument": "over the years", "role": "time", "argument_pos": []}, {"argument": "Project Zero", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Beer posted a blog about several vulnerabilities in iOS 7 he found in 2014 that share commonalities with several bugs he has found in iOS 11.4.1 , some of which he 's now released exploits for .", "event": [{"event_trigger": "posted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Beer", "role": "discoverer", "argument_pos": []}, {"argument": "several vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "iOS 7", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Beer notes that none of the latest issues is mentioned in the iOS 12 security bulletin even though Apple did fix them .", "event": [{"event_trigger": "did fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "them", "role": "vulnerability", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The absence of information about them is a \" disincentive \" for iOS users to patch , Beer argues .", "event": [{"event_trigger": "patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "\" Apple are still yet to assign CVEs for these issues or publicly acknowledge that they were fixed in iOS 12 , \" wrote Beer .", "event": [{"event_trigger": "were fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "releaser", "argument_pos": []}, {"argument": "iOS 12", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "\" In my opinion a security bulletin should mention the security bugs that were fixed .", "event": [{"event_trigger": "were fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the security bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Not doing so provides a disincentive for people to update their devices since it appears that there were fewer security fixes than there really were .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "fewer security fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "\" In other instances , such as one macOS bug Beer reported , Apple did actually assign a CVE , but it still has n't updated the relevant security bulletin to reflect the fix .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Beer", "role": "discoverer", "argument_pos": []}, {"argument": "one macOS bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Apple similarly allocated CVE -2018-4337 to another high - severity iOS bug , which was fixed in iOS 12 , but is n't currently acknowledged in the iOS 12 security bulletin .", "event": [{"event_trigger": "allocated", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-4337", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "high - severity iOS bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In another case , Apple fixed a bug that affected iOS and macOS but did n't assign a CVE or mention it in the security bulletins .", "event": [{"event_trigger": "did n't assign", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a CVE", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Not only may it be a disincentive for end - users to patch iPhones and Macs , but Beer also points out in another bug report that the lack of public acknowledgement by Apple means he has no way of knowing whether the issue is a duplicate that another researcher may have already found .", "event": [{"event_trigger": "public acknowledgement", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "As he notes in the blog , many of the bugs he has found in iOS are very similar or the same as bugs found by noted jailbreaking hackers Pangu Team .", "event": [{"event_trigger": "notes", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs let hackers crash IoT devices , leak their information , and completely take them over .", "event": [{"event_trigger": "leak", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "their information", "role": "compromised data", "argument_pos": []}, {"argument": "IoT devices", "role": "victim", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers have found that a popular Internet of Things real - time operating system – FreeRTOS – is riddled with serious vulnerabilities .", "event": [{"event_trigger": "have found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "real - time operating system", "role": "vulnerable system", "argument_pos": []}, {"argument": "Researchers", "role": "discoverer", "argument_pos": []}, {"argument": "FreeRTOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "serious vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Internet of Things", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs could allow hackers to crash connected devices in smart homes or critical infrastructure systems , leak information from the devices ’ memory , and take them over .", "event": [{"event_trigger": "leak", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "information", "role": "compromised data", "argument_pos": []}, {"argument": "the devices ’ memory", "role": "victim", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "infrastructure systems", "role": "victim", "argument_pos": []}, {"argument": "smart homes", "role": "victim", "argument_pos": []}, {"argument": "devices", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "And while patches have been issued , researchers warn that it still may take time for smaller vendors to update .", "event": [{"event_trigger": "have been issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Within several versions of FreeRTOS , Karliner found 13 vulnerabilities enabling an array of attacks , including remote code execution , information leak and denial - of - service bugs .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "FreeRTOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Karliner", "role": "discoverer", "argument_pos": []}, {"argument": "13 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "enabling an array of attacks", "role": "capabilities", "argument_pos": []}, {"argument": "remote code execution", "role": "capabilities", "argument_pos": []}, {"argument": "information leak", "role": "capabilities", "argument_pos": []}, {"argument": "several versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "denial - of - service bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "“ During our research , we discovered multiple vulnerabilities within FreeRTOS ’s TCP / IP stack and in the AWS secure connectivity modules .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "multiple vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the AWS secure connectivity modules", "role": "vulnerable system", "argument_pos": []}, {"argument": "we", "role": "discoverer", "argument_pos": []}, {"argument": "FreeRTOS ’s TCP / IP stack", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The same vulnerabilities are present in WHIS Connect TCP / IP component for OpenRTOS \\ SafeRTOS , ” according to a Thursday post by zLabs .", "event": [{"event_trigger": "are present in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The same vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "WHIS Connect TCP / IP component", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenRTOS \\ SafeRTOS", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerabilities specifically exist in FreeRTOS ’s TCP / IP stack and in the AWS secure connectivity modules ( in as well as in the WHIS Connect TCP / IP component for OpenRTOS \\ SafeRTOS ) .", "event": [{"event_trigger": "exist in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "FreeRTOS ’s TCP / IP stack", "role": "vulnerable system", "argument_pos": []}, {"argument": "the AWS secure connectivity modules", "role": "vulnerable system", "argument_pos": []}, {"argument": "the WHIS Connect TCP / IP component", "role": "vulnerable system", "argument_pos": []}, {"argument": "OpenRTOS \\ SafeRTOS", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "zLabs said it has disclosed the security issues to Amazon and collaborated with them to patch the vulnerabilities .", "event": [{"event_trigger": "has disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "discoverer", "argument_pos": []}, {"argument": "the security issues", "role": "vulnerability", "argument_pos": []}, {"argument": "Amazon", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Those fixes were deployed for AWS FreeRTOS versions 1.3.2 and onwards .", "event": [{"event_trigger": "were deployed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "AWS FreeRTOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Those fixes", "role": "patch", "argument_pos": []}, {"argument": "versions 1.3.2", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerabilities in RTOS WHIS were also patched .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "RTOS WHIS", "role": "vulnerable system", "argument_pos": []}, {"argument": "The vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Due to the amount of vendors impacted by the bugs , the researchers said that they would hold off on publishing further details until all holes have been sealed .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "A severe WordPress vulnerability which has been left a year without being patched has the potential to disrupt countless websites running the CMS , researchers claim .", "event": [{"event_trigger": "claim", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "At the BSides technical cybersecurity conference in Manchester on Thursday , Secarma researcher Sam Thomas said the bug permits attackers to exploit the WordPress PHP framework , resulting in a full system compromise .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "resulting in a full system compromise", "role": "capabilities", "argument_pos": []}, {"argument": "permits attackers to exploit the WordPress PHP framework", "role": "capabilities", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Secarma researcher Sam Thomas", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The security researcher says the core vulnerability , which is yet to receive a CVE number , is within the wp_get_attachment_thumb_file function in / wpincludes/post.php and when attackers gain control of a parameter used in the \" file_exists \" call , \" the bug can be triggered .", "event": [{"event_trigger": "receive a CVE", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The issue of unserialization was first uncovered back in 2009 , and since then , vulnerabilities have been recognized in which the integrity of PHP systems can be compromised , such as CVE -2017-12934 , CVE -2017-12933 , and CVE - 2017 - 12932 .", "event": [{"event_trigger": "uncovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The issue of unserialization", "role": "vulnerability", "argument_pos": []}, {"argument": "2009", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The WordPress content management system ( CMS ) is used by millions of webmasters to manage domains , which means the vulnerability potentially has a vast victim pool should the flaw being exploited in the wild .", "event": [{"event_trigger": "being exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" Issues which they might have thought were fixed with a configuration change or had been considered quite minor previously might need to be reevaluated in the light of the attacks I demonstrated . \"", "event": [{"event_trigger": "were fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "According to Secarma , the CMS provider was made aware of the security issue in February 2017 , but \" is yet to take action . \"", "event": [{"event_trigger": "was made aware", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the CMS provider", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the security issue", "role": "vulnerability", "argument_pos": []}, {"argument": "February 2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability was originally reported through the WordPress HackerOne bug bounty program last year .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "last year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The issue was confirmed after several days and Thomas was credited for his findings .", "event": [{"event_trigger": "was confirmed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The issue", "role": "vulnerability", "argument_pos": []}, {"argument": "several days", "role": "time", "argument_pos": []}, {"argument": "Thomas", "role": "discoverer", "argument_pos": []}, {"argument": "his findings", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "However , a Secarma spokesperson told ZDNet that while there was \" some attempt to fix the issue \" in May 2017 , this did not address the problem .", "event": [{"event_trigger": "did not address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the problem", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Tumblr has fixed a vulnerability that it says could have exposed private user data , according to an announcement by the microblogging and social networking site .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tumblr", "role": "releaser", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "exposed private user data", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The information that could have been viewed by unauthorized parties includes email addresses , hashed and salted passwords , locations , previously used email addresses , and last login IPs .", "event": [{"event_trigger": "have been viewed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "The information", "role": "compromised data", "argument_pos": []}, {"argument": "unauthorized parties", "role": "attacker", "argument_pos": []}, {"argument": "email addresses", "role": "compromised data", "argument_pos": []}, {"argument": "passwords ,", "role": "compromised data", "argument_pos": []}, {"argument": "last login IPs", "role": "compromised data", "argument_pos": []}, {"argument": "email addresses", "role": "compromised data", "argument_pos": []}, {"argument": "locations", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw resided in the “ Recommended Blogs ” feature in the desktop version of Tumblr .", "event": [{"event_trigger": "resided in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Tumblr", "role": "vulnerable system", "argument_pos": []}, {"argument": "desktop version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Discovered and reported through the platform ’s bug bounty program several weeks ago , the security vulnerability was resolved within 12 hours .", "event": [{"event_trigger": "Discovered and reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "several weeks ago", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Nevertheless , the company ’s decision to disclose the flaw is because of what Tumblr says is its commitment to transparency and because it believes that “ it ’s simply the right thing to do ” .", "event": [{"event_trigger": "disclose", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the company", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "It has also taken steps to “ improve monitoring and analysis procedures to help it identify and fix any similar bugs in the future ” .", "event": [{"event_trigger": "identify", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Tumblr has joined the ranks of other high - profile technology companies , such as Twitter , Facebook and Google , that have all revealed vulnerabilities in recent weeks that could have been exploited , or were actually exploited , for harvesting the private information of some users .", "event": [{"event_trigger": "have all revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "recent weeks", "role": "time", "argument_pos": []}, {"argument": "Google", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Tumblr", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Twitter", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Facebook", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Back in 2016 , Tumblr had its hands full with a security incident that compromised the details of 65 million Tumblr users as a result of a breach dating back to 2013 .", "event": [{"event_trigger": "a breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "2013", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft this week released software updates to fix roughly 50 security problems with various versions of its Windows operating system and related software , including one flaw that is already being exploited and another for which exploit code is publicly available .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "software updates", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The zero - day bug — CVE -2018-8453 — affects Windows versions 7 , 8.1 , 10 and Server 2008 , 2012 , 2016 and 2019 .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The zero - day bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-8453", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "Server 2008", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 7", "role": "vulnerable system version", "argument_pos": []}, {"argument": "8.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "10", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Another vulnerability patched on Tuesday — CVE -2018-8423 — was publicly disclosed last month along with sample exploit code .", "event": [{"event_trigger": "was publicly disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "last month", "role": "time", "argument_pos": []}, {"argument": "CVE -2018-8423", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "exploit code", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This flaw involves a component shipped on all Windows machines and used by a number of programs , and could be exploited by getting a user to open a specially - crafted file — such as a booby - trapped Microsoft Office document .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows machines", "role": "vulnerable system", "argument_pos": []}, {"argument": "programs", "role": "vulnerable system", "argument_pos": []}, {"argument": "flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "KrebsOnSecurity has frequently suggested that Windows users wait a day or two after Microsoft releases monthly security updates before installing the fixes , with the rationale that occasionally buggy patches can cause serious headaches for users who install them before all the kinks are worked out .", "event": [{"event_trigger": "releases", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "monthly security updates", "role": "patch", "argument_pos": []}, {"argument": "the fixes", "role": "patch", "argument_pos": []}, {"argument": "buggy patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "This month , Microsoft briefly paused updates for Windows 10 users after many users reported losing all of the files in their “ My Documents ” folder .", "event": [{"event_trigger": "paused", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "This month", "role": "time", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "Windows 10", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft appears to have since fixed the issue , but these kinds of incidents illustrate the value of not only waiting a day or two to install updates but also manually backing up your data prior to installing patches ( i.e. , not just simply counting on Microsoft ’s System Restore feature to save the day should things go haywire ) .", "event": [{"event_trigger": "these kinds of incidents", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Mercifully , Adobe has spared us an update this month for its Flash Player software , although it has shipped a non-security update for Flash .", "event": [{"event_trigger": "has spared", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "this month", "role": "time", "argument_pos": []}, {"argument": "its Flash Player software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Yesterday , Oracle released its quarterly critical patch update ( CPU ) for Q3 2018 , the October edition , during which the company fixed 301 vulnerabilities .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Vulnerabilities that receive this severity ratings this high can be exploited remotely , with no authentication , and the exploit chain is accessible even to low - skilled attackers , even to those with no in - depth technical knowledge .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the exploit chain", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This will give companies more time to update affected applications before details about each flaw are generally available to everyone , including the bad guys .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "companies", "role": "releaser", "argument_pos": []}, {"argument": "applications", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "For now , little information is known , but the vulnerability that received the 10.0 rating impacts Oracle GoldenGate , a data replication framework that can work with large quantities of information in real - time .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle GoldenGate", "role": "vulnerable system", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This issue does n't impact standalone GoldenGate installations , but also the numerous other Oracle product setups where GoldenGate can be deployed as an add - in option , such as the Oracle Database Server , DB2 , MySQL , Sybase , Terradata , and others .", "event": [{"event_trigger": "does n't impact", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "This issue", "role": "vulnerability", "argument_pos": []}, {"argument": "standalone GoldenGate installations", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As for vulnerabilities rated 9.8 on the severity scale , these were reported affecting products such as the Oracle Database Server , Oracle Communications , the Oracle Construction and Engineering Suite , the Oracle Enterprise Manager Products Suite , Oracle Fusion Middleware , Oracle Insurance Applications , Oracle JD Edwards , MySQL , Oracle Retail , the Oracle Siebel CRM , and the Oracle Sun Systems Products Suite .", "event": [{"event_trigger": "were reported affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "products", "role": "vulnerable system", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the Oracle Sun Systems Products Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Oracle Siebel CRM", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Retail", "role": "vulnerable system", "argument_pos": []}, {"argument": "MySQL", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle JD Edwards", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Insurance Applications", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Fusion Middleware", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Oracle Enterprise Manager Products Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "Engineering Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Oracle Construction", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Communications", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Oracle Database Server", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "That title goes to July 2018 's CPU , which addressed 334 vulnerabilities , 55 of which had a 9.8 severity rating .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "According to the folks at ERPScan , in 2018 , Oracle patched 1119 vulnerabilities , the same number of flaws it patched last year in 2017 .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "1119 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}, {"argument": "2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle has released a wide - ranging security update to address more than 300 CVE - listed vulnerabilities in its various enterprise products .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle", "role": "releaser", "argument_pos": []}, {"argument": "a wide - ranging security update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "For Database , the update addresses a total of three flaws .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "three flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the update", "role": "patch", "argument_pos": []}, {"argument": "Database", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Two of the vulnerabilities ( CVE -2018-3259 and CVE -2018-3299 ) can be remotely exploited without authentication , while the third , CVE -2018-7489 , would require the user to have a Rapid Home Provisioning account to execute and is considered by far the least severe of the three .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Two of the vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-3259", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-3299", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-7489", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle noted that all three bugs only impact the server versions of Database , user clients are not considered to be vulnerable .", "event": [{"event_trigger": "noted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle", "role": "discoverer", "argument_pos": []}, {"argument": "three bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Java SE will get 12 security fixes , with all but one being for remotely exploitable vulnerabilities in that platform .", "event": [{"event_trigger": "will get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "12 security fixes", "role": "patch", "argument_pos": []}, {"argument": "Java SE", "role": "vulnerable system", "argument_pos": []}, {"argument": "exploitable vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle notes that though the CVSS scores for the flaws are fairly high , Solaris and Linux machines running software with lower user privileges will be considered to be at a lower risk than Windows environments that typically operate with admin privileges .", "event": [{"event_trigger": "notes", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle", "role": "discoverer", "argument_pos": []}, {"argument": "the flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "libssh bug more like \" oh SSH … \" Once admins get the Oracle patches in place , they will want to take a close look at the write - up for CVE -2018-10933 , an authentication bypass for libssh that would allow an attacker to get into a target machine by sending a \" SSH2_MSG_USERAUTH_SUCCESS \" message when it expects a \" SSH2_MSG_USERAUTH_REQUEST \" message .", "event": [{"event_trigger": "get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Oracle patches", "role": "patch", "argument_pos": []}, {"argument": "admins", "role": "releaser", "argument_pos": []}, {"argument": "CVE -2018-10933", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "According to a press release , ONWASA 's internal computer system , including servers and personal computers , have been subjected to a sophisticated ransomware attack .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "personal computers", "role": "victim", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "internal computer system", "role": "victim", "argument_pos": []}, {"argument": "ONWASA", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "CEO Jeffrey Hudson said customer information was not compromised in the attack .", "event": [{"event_trigger": "the attack", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The email is consistent with ransomware attacks of other governments and corporations .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "There is no expectation that a ransom payment would stop future attacks .", "event": [{"event_trigger": "a ransom payment", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The cyber attackers are demanding payment to decrypt everything that was stolen .", "event": [{"event_trigger": "are demanding payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The cyber attackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "ONWASA said it will not \" negotiate with criminals nor bow to their demands . \"", "event": [{"event_trigger": "their demands", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "criminals", "role": "attacker", "argument_pos": []}, {"argument": "ONWASA", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The Onslow Water and Sewer Authority 's internal computer system , including servers and personal computers , was hit by a ransomware attack Saturday .", "event": [{"event_trigger": "was hit by a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "personal computers", "role": "victim", "argument_pos": []}, {"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "internal computer system ,", "role": "victim", "argument_pos": []}, {"argument": "Saturday", "role": "time", "argument_pos": []}, {"argument": "The Onslow Water and Sewer Authority", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The utility said customer information was not compromised in the attack , but many of databases will have to be recreated in their entirety .", "event": [{"event_trigger": "the attack", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Furthermore , there is no expectation that payment of a ransom would forestall repeat attacks .", "event": [{"event_trigger": "payment of a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The FBI agrees that ransoms should not be paid .", "event": [{"event_trigger": "ransoms should not be paid", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Officials in Madison County say a ransomware attack has left the county struggling to conduct business .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the county", "role": "victim", "argument_pos": []}, {"argument": "Madison County", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The objective of ransomware is to cut off a user 's access to computer systems and then demand payment to return that access .", "event": [{"event_trigger": "demand payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "cut off a user 's access to computer systems", "role": "attack pattern", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Mendenhall and Muir say they have no intention of paying the ransom and have n't looked to see how much is being demanded .", "event": [{"event_trigger": "paying the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "they", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Mendenhall credited county workers for backing up data , meaning the system can be restored without paying the ransom .", "event": [{"event_trigger": "paying the ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the system", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "IBM has withdrawn a patch for a significant security vulnerability in its WebSphere Application Server after the code knackered some systems .", "event": [{"event_trigger": "has withdrawn", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "IBM", "role": "releaser", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "a significant security vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "its WebSphere Application Server", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Just this week , Big Blue said it is working on a new fix for CVE -2018-1567 , a remote - code execution vulnerability in versions 9.0 , 8.5 , 8.0 , and 7.0 of the platform .", "event": [{"event_trigger": "is working on", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Big Blue", "role": "releaser", "argument_pos": []}, {"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "a new fix", "role": "patch", "argument_pos": []}, {"argument": "CVE -2018-1567", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "a remote - code execution vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "7.0", "role": "vulnerable system version", "argument_pos": []}, {"argument": "versions 9.0", "role": "vulnerable system version", "argument_pos": []}, {"argument": "8.0", "role": "vulnerable system version", "argument_pos": []}, {"argument": "8.5", "role": "vulnerable system version", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The bug was sealed up on September 5 , when IBM made the fix available for download and installation .", "event": [{"event_trigger": "available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the fix", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Unfortunately , the patch had been causing problems , forcing IBM to pull the fix on Wednesday , more than a month .", "event": [{"event_trigger": "pull", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Wednesday", "role": "time", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}, {"argument": "IBM", "role": "releaser", "argument_pos": []}, {"argument": "the patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Big Blue said the patch was yanked \" due to regression \" , which is the fancy way of saying it was mucking stuff up .", "event": [{"event_trigger": "was yanked", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "\" The fix has been removed while it is being reworked by development . \"", "event": [{"event_trigger": "has been removed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "IBM did not say when the updated patch might be arriving , putting some admins in the difficult position of either leaving a vulnerability open or risking crashes .", "event": [{"event_trigger": "might be arriving", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the updated patch", "role": "patch", "argument_pos": []}, {"argument": "IBM", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "In Big Blue 's defense , this is far from the first time a company has had to pull a security patch that was found to pose stability concerns .", "event": [{"event_trigger": "has had to pull", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a company", "role": "releaser", "argument_pos": []}, {"argument": "a security patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In fact , just today word surfaced that a number of HP users have been struggling with blue screen crashes affected their PCs after installing this week 's Patch Tuesday updates .", "event": [{"event_trigger": "installing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "A WhatsApp security vulnerability could allow attackers to crash the iOS app as soon as you answer a call , and could potentially be used to hack your iPhone … The Register reports that the flaw was reported to WhatsApp in August , and has been patched in the latest version – so you ’ll want to check for an update .", "event": [{"event_trigger": "has been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest version", "role": "patch number", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Google Project Zero whizkid and Tamagotchi whisperer Natalie Silvanovich discovered and reported the flaw , a memory heap overflow issue , directly to WhatsApp in August .", "event": [{"event_trigger": "discovered and reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tamagotchi whisperer Natalie Silvanovich", "role": "discoverer", "argument_pos": []}, {"argument": "Google Project Zero whizkid", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "WhatsApp", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "August", "role": "time", "argument_pos": []}, {"argument": "a memory heap overflow issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Now that a fix is out , Silvanovich can go public with details on the potentially serious flaw .", "event": [{"event_trigger": "is out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "Now", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "According to Silvanovich ’s report , the bug is triggered when a user receives a malformed RTP packet , triggering the corruption error and crashing the application .", "event": [{"event_trigger": "Silvanovich ’s report", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "triggering the corruption error and crashing the application", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "It ’s not clear whether the WhatsApp security flaw could be exploited for remote code execution , but this is a possibility , and a sufficient risk for a fellow Google researcher to describe it as ‘ a big deal . ’", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the WhatsApp security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "remote code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The same vulnerability was present in the Android app , which has also been patched .", "event": [{"event_trigger": "was present in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Android app", "role": "vulnerable system", "argument_pos": []}, {"argument": "The same vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The Register says it is still waiting to hear from Google on more details , for example whether the desktop app is similarly affected .", "event": [{"event_trigger": "is similarly affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the desktop app", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "It ’s not the first time of late that a WhatsApp security issue has been identified .", "event": [{"event_trigger": "has been identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a WhatsApp security issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Back in August , it was discovered that it was possible for an attacker to change both the content and the sender of a WhatsApp message after you ’ve received it .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "August", "role": "time", "argument_pos": []}, {"argument": "it", "role": "vulnerability", "argument_pos": []}, {"argument": "an attacker to change both the content", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The Git community has disclosed a security vulnerability affecting the clone and submodule commands that could enable remote code execution when vulnerable machines access malicious repositories .", "event": [{"event_trigger": "has disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Git community", "role": "discoverer", "argument_pos": []}, {"argument": "a security vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , which has been assigned CVE – 2018 – 17456 by Mitre , has been fixed in Git 2.19.1 .", "event": [{"event_trigger": "has been assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE – 2018 – 17456", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Mitre", "role": "discoverer", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This would affect both git clone -- recurse - submodules and git submodule update -- recursive in that they would recursively pass the URL starting with a dash to a git clone or git submodule subprocess that would interpret the URL as a command option .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "both git clone", "role": "vulnerable system", "argument_pos": []}, {"argument": "recurse - submodules", "role": "vulnerable system", "argument_pos": []}, {"argument": "git submodule update", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As shown in the PR fixing the vulnerability , submitted by @joernchen , the fix is quite trivial in itself .", "event": [{"event_trigger": "the PR fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Additionally , it has been backported to versions 2.14.5 , 2.15.3 , 2.16.5 , 2.17.2 , and 2.18.1 .", "event": [{"event_trigger": "has been backported", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}, {"argument": "versions 2.14.5", "role": "patch number", "argument_pos": []}, {"argument": "2.15.3", "role": "patch number", "argument_pos": []}, {"argument": "2.16.5", "role": "patch number", "argument_pos": []}, {"argument": "2.17.2", "role": "patch number", "argument_pos": []}, {"argument": "2.18.1", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Since git is integrated in GitHub projects such as GitHub Desktop and Atom , those have been patched as well , so you will be better off upgrading them as soon as possible .", "event": [{"event_trigger": "upgrading", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "them", "role": "vulnerable system", "argument_pos": []}, {"argument": "as soon as possible", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "WhatsApp has patched a vulnerability in its smartphone code that could have been exploited by miscreants to crash victims ' chat app simply by placing a call .", "event": [{"event_trigger": "been exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "crash victims ' chat app", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Fortunately , as the bug has been patched users will be able to get a fix for the flaw by updating to the latest version of WhatsApp on Android and iOS .", "event": [{"event_trigger": "has been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Earlier today , Microsoft delivered its Patch Tuesday security bundle , with Adobe dropping its second major patch bundle in as many weeks and Google having posted the Android monthly update last week .", "event": [{"event_trigger": "delivered", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security bundle", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "Earlier today", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "These chips are the first generation of new desktop CPUs to come with hardware fixes for the Spectre and Meltdown bugs which emerged in recent years .", "event": [{"event_trigger": "come with", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "hardware fixes", "role": "patch", "argument_pos": []}, {"argument": "the Spectre and Meltdown bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "desktop CPUs", "role": "vulnerable system", "argument_pos": []}, {"argument": "chips", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In particular , it ’s the new K - series of gaming CPUs that are receiving the fix .", "event": [{"event_trigger": "are receiving", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "gaming CPUs", "role": "vulnerable system", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Although they are still based on the same 14nm node that has dominated Intel ’s chip designs since 2014 , these would be the first ones to come with a fix for these sorts of bugs at the hardware level .", "event": [{"event_trigger": "come with", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The second set of new 9th - gen chips , the X-series ( and Xeon - class chips ) , do n’t have those same security fixes .", "event": [{"event_trigger": "do n’t have", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "those same security fixes", "role": "patch", "argument_pos": []}, {"argument": "Xeon - class chips", "role": "vulnerable system", "argument_pos": []}, {"argument": "the X-series", "role": "vulnerable system", "argument_pos": []}, {"argument": "The second set of new 9th - gen chips", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Because they ’re based on the older Skylake - X architecture , Intel is relying solely on software updates to keep them protected against these possible vulnerabilities .", "event": [{"event_trigger": "protected against", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "software updates", "role": "patch", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "these possible vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Intel has been criticized in the past for the way it has handled these potentially critical flaws and has had a relatively slow move toward patching the vulnerabilities on a hardware level throughout 2018 .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "these potentially critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "a hardware", "role": "vulnerable system", "argument_pos": []}, {"argument": "2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Indeed , patches that fix security vulnerabilities often end up giving away enough about the vulnerability that both good guys and bad guys alike can weaponise it from first principles – all without having to figure out the vulnerability in the first place .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The perils of late patching What we did n’t know back then was that security researchers at Tenable had responsibly disclosed another bunch of Mikrotik router bugs at about the same time .", "event": [{"event_trigger": "had responsibly disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security researchers", "role": "discoverer", "argument_pos": []}, {"argument": "Mikrotik router bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Tenable", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The good news is that Mikrotik has already patched Tenable ’s now - disclosed bugs , dubbed CVE -2018-1156 , -1157 , -1158 and -1159 .", "event": [{"event_trigger": "has already patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mikrotik", "role": "releaser", "argument_pos": []}, {"argument": "Tenable ’s now - disclosed bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-1156", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "-1157", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "-1158", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "-1159", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "The Git Project announced yesterday a critical arbitrary code execution vulnerability in the Git command line client , Git Desktop , and Atom that could allow malicious repositories to remotely execute commands on a vulnerable machine .", "event": [{"event_trigger": "announced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Git Project", "role": "discoverer", "argument_pos": []}, {"argument": "yesterday", "role": "time", "argument_pos": []}, {"argument": "a critical arbitrary code execution vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the Git command line client", "role": "vulnerable system", "argument_pos": []}, {"argument": "Git Desktop", "role": "vulnerable system", "argument_pos": []}, {"argument": "Atom", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow malicious repositories to remotely execute commands", "role": "capabilities", "argument_pos": []}, {"argument": "machine", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "This vulnerability has been assigned the CVE -2018-17456 ID and is similar to a previous CVE -2017-1000117 option injection vulnerability .", "event": [{"event_trigger": "has been assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "This vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-17456", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2017-1000117", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "option injection vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" This vulnerability has been fixed in Git v2 .19.1 ( with backports in v2 .14.5 , v2 .15.3 , v2 .16.5 , v2 .17.2 , and v2 .18.1 ) , GitHub Desktop 1.4.2 , Github Desktop 1.4.3 - beta0 , Atom 1.31.2 , and Atom 1.32.0 - beta3 .", "event": [{"event_trigger": "has been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "This vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "v2 .19.1", "role": "patch number", "argument_pos": []}, {"argument": "1.4.2", "role": "patch number", "argument_pos": []}, {"argument": "1.4.3 - beta0", "role": "patch number", "argument_pos": []}, {"argument": "1.31.2", "role": "patch number", "argument_pos": []}, {"argument": "1.32.0 - beta3", "role": "patch number", "argument_pos": []}, {"argument": "Git", "role": "vulnerable system", "argument_pos": []}, {"argument": "v2 .17.2", "role": "vulnerable system version", "argument_pos": []}, {"argument": "v2 .18.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "v2 .16.5", "role": "vulnerable system version", "argument_pos": []}, {"argument": "v2 .15.3", "role": "vulnerable system version", "argument_pos": []}, {"argument": "v2 .14.5", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Atom", "role": "vulnerable system", "argument_pos": []}, {"argument": "Atom", "role": "vulnerable system", "argument_pos": []}, {"argument": "Github Desktop", "role": "vulnerable system", "argument_pos": []}, {"argument": "GitHub Desktop", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The Git Project strongly recommends that all users upgrade to the latest version of the Git client , Github Desktop , or Atom in order to be protected from malicious repositories .", "event": [{"event_trigger": "recommends", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Git Project", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has resolved a set of critical vulnerabilities in Policy Suite which permit attackers to cause havoc in the software 's databases .", "event": [{"event_trigger": "has resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "a set of critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Policy Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "permit attackers to cause havoc in the software 's databases", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "This week , the tech giant released a security advisory detailing four vulnerabilities which could place enterprise users at risk of information leaks , account compromise , database tampering , and more .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the tech giant", "role": "releaser", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "place enterprise users at risk of information leaks", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Described as an unauthenticated bypass bug , the security flaw \" could allow an unauthenticated , remote attacker to connect directly to the Policy Builder database , \" according to Cisco .", "event": [{"event_trigger": "Described as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "allow an unauthenticated , remote attacker to connect directly to the Policy Builder database", "role": "capabilities", "argument_pos": []}, {"argument": "the security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "an unauthenticated bypass bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco Policy Suite releases prior to 18.2.0 are affected .", "event": [{"event_trigger": "are affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco Policy Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "prior to 18.2.0", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The CVSS 9.8 bug is present in the Cluster Manager of Cisco Policy Suite and could allow an unauthenticated , remote attacker to log in to a vulnerable system using a root account .", "event": [{"event_trigger": "is present in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The CVSS 9.8 bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the Cluster Manager", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco Policy Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow an unauthenticated , remote attacker to log in to a vulnerable system", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The serious security problem has emerged due to the use of undocumented , static user credentials for root accounts .", "event": [{"event_trigger": "has emerged", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The serious security problem", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Versions of the software prior to 18.2.0 are vulnerable to exploit .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "software", "role": "vulnerable system", "argument_pos": []}, {"argument": "prior to 18.2.0", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "\" A successful exploit could allow the attacker to make changes to existing repositories and create new repositories , \" Cisco says .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "allow the attacker to make changes to existing repositories", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco Policy Suite versions prior to 18.2.0 are affected .", "event": [{"event_trigger": "are affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco Policy Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions prior to 18.2.0", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The fourth security flaw , CVE -2018-0377 , affects the Open Systems Gateway initiative ( OSGi ) interface of Cisco Policy Suite .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The fourth security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-0377", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the Open Systems Gateway initiative ( OSGi ) interface", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco Policy Suite", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "This vulnerability impacts Policy Suite versions prior to 18.1.0 .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "This vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Policy Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions prior to 18.1.0", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "However , patches have been issued to address them and Cisco says that no reports have been received which indicate the bugs are being exploited in the wild .", "event": [{"event_trigger": "being exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In addition , Cisco has revealed seven now - patched bugs affecting SD - WAN solutions .", "event": [{"event_trigger": "has revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "discoverer", "argument_pos": []}, {"argument": "seven now - patched bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "A Google Project Zero researcher has published a macOS exploit to demonstrate that Apple is exposing its users to security risks by patching serious flaws in iOS but not revealing the fact until it fixes the same bugs in macOS a week later .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "serious flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "This happened during Apple 's update for critical flaws in iOS 12 , tvOS 12 and Safari 12 on September 17 .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "iOS 12", "role": "vulnerable system", "argument_pos": []}, {"argument": "tvOS 12", "role": "vulnerable system", "argument_pos": []}, {"argument": "Safari 12", "role": "vulnerable system", "argument_pos": []}, {"argument": "September 17", "role": "time", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "A Wayback Machine snapshot of the original advisory does n't mention any of the bugs that Project Zero researcher Ivan Fratric had reported to Apple , and which were actually fixed .", "event": [{"event_trigger": "had reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Project Zero researcher Ivan Fratric", "role": "discoverer", "argument_pos": []}, {"argument": "Apple", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Then , a week later , after Apple patched the same bugs in macOS , the company updated its original advisory with details about the nine flaws that Fratric had reported , six of which affected Safari .", "event": [{"event_trigger": "had reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Fratric", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The update fixed a Safari bug that allowed arbitrary code execution on macOS if a vulnerable version of Safari browsed to a website hosting an exploit for the bugs .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "a Safari bug", "role": "vulnerability", "argument_pos": []}, {"argument": "allowed arbitrary code execution", "role": "issues addressed", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}, {"argument": "vulnerable version", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Safari browsed", "role": "vulnerable system", "argument_pos": []}, {"argument": "the bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "While Fratric concedes that Apple is probably concealing the fix in iOS to buy time to patch macOS , he argues the end result is that people may ignore an important security update because they were n't properly informed by Apple in the security advisory .", "event": [{"event_trigger": "is probably concealing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Fratric developed an exploit for one of the Safari bugs he reported and published the attack on Thursday .", "event": [{"event_trigger": "reported and published", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "the Safari bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Fratric", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs were all found using a publicly available fuzzing tool he developed , called Domato , meaning anyone else , including highly advanced attackers , could use it too .", "event": [{"event_trigger": "were all found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Last year he found 17 Safari flaws using the fuzzing tool .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Safari flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "Last year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has plugged two severe vulnerabilities affecting its Digital Network Architecture ( DNA ) Center software .", "event": [{"event_trigger": "has plugged", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "two severe vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "its Digital Network Architecture ( DNA ) Center software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Appliances running Cisco 's DNA Center software before Release 1.1.4 are vulnerable to an authentication bypass that could allow a remote attacker to \" take complete control \" of its identity management functions .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "DNA Center software", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow a remote attacker to \" take complete control \"", "role": "capabilities", "argument_pos": []}, {"argument": "Cisco", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Release 1.1.4", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw , which is tracked as CVE -2018-0448 , is rated critical and has a Common Vulnerability Scoring System ( CVSS ) v 3.0 rating of 9.8 out of 10 .", "event": [{"event_trigger": "is tracked as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-0448", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "It 's fixed in release 1.1.4 and later and since there are no workarounds , admins will need to update to these releases to fix the bug .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these releases", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco also fixed another critical DNA Center flaw , CVE -2018-15386 , which could give a remote attacker direct access to core management functions .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "critical DNA Center flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15386", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a remote attacker direct access to core management functions", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "An attacker could exploit the bug by directly connecting to exposed DNA Center services and from there obtain or change critical system files .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "DNA Center services", "role": "victim", "argument_pos": []}, {"argument": "exploit the bug", "role": "attack pattern", "argument_pos": []}, {"argument": "attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "This bug is due to insecure default configurations affecting DNA Center release 1.1 Again , there are no workarounds for the bug , so admins will need to update to release 1.2 and later .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "release 1.2 and later", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Both flaws were found during internal testing .", "event": [{"event_trigger": "were found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Both flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has also fixed a critical flaw affecting Cisco Prime Infrastructure ( PI ) that could let a remote attacker upload any file they wishwithout requiring authentication .", "event": [{"event_trigger": "has also fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "a critical flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco Prime Infrastructure ( PI )", "role": "vulnerable system", "argument_pos": []}, {"argument": "a remote attacker upload any file they wishwithout requiring authentication", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw was reported by independent security researcher Pedro Ribeiro through Beyond Security 's SecuriTeam Secure Disclosure program .", "event": [{"event_trigger": "was reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "independent security researcher Pedro Ribeiro", "role": "discoverer", "argument_pos": []}, {"argument": "Beyond Security 's SecuriTeam Secure Disclosure program", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Beyond Security notes in its detailed report about the PI issue that Ribeiro identified two flaws but only one was fixed in Cisco 's patch .", "event": [{"event_trigger": "was fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "only one", "role": "vulnerability", "argument_pos": []}, {"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "From our assessment the provided fix only addresses the file uploading part of the exploit , not the file inclusion , the ability to execute arbitrary code through it or the privileges escalation issue that the product has .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the provided fix", "role": "patch", "argument_pos": []}, {"argument": "the privileges escalation issue", "role": "issues addressed", "argument_pos": []}, {"argument": "the ability to execute arbitrary code through", "role": "issues addressed", "argument_pos": []}, {"argument": "the exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" Cisco also released patches for 33 more high - and medium - severity flaws affecting WebEx , SD - WAN products , and its ASA security appliances .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "its ASA security appliances", "role": "vulnerable system", "argument_pos": []}, {"argument": "SD - WAN products", "role": "vulnerable system", "argument_pos": []}, {"argument": "WebEx", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "33 more high - and medium - severity flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has released updates fixing a long list of security vulnerabilities discovered in the Mac and Windows versions of Acrobat and Reader .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "There was a time when having to patch so many flaws in a small suite of products from one company would have been seen as a failure .", "event": [{"event_trigger": "having to patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "products", "role": "vulnerable system", "argument_pos": []}, {"argument": "one company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Arguably , these days , it ’s a sign of success – researchers are devoting the time to finding vulnerabilities before the bad guys do and Adobe is turning around fixes .", "event": [{"event_trigger": "finding", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Foxit last week released what appears to be 116 vulnerabilities of their own ( confusingly , many of which are not yet labelled with CVEs ) .", "event": [{"event_trigger": "appears to be", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Foxit", "role": "discoverer", "argument_pos": []}, {"argument": "last week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "For some reason , the number of flaws being found in Foxit ’s programs has surged this year , reaching 183 before this September ’s count , compared to 76 for the whole of 2017 .", "event": [{"event_trigger": "being found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "programs", "role": "vulnerable system", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}, {"argument": "Foxit", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "As for Adobe , these updates are unlikely to be the last we hear of the company this month – expect the usual flaws to be patched in Adobe ’s legacy Flash plug - in when Microsoft releases its Windows Patch Tuesday on 9 October .", "event": [{"event_trigger": "be patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Flash plug - in", "role": "vulnerable system", "argument_pos": []}, {"argument": "the usual flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Foxit has patched more than 118 vulnerabilities in its PDF reader , some of which could be exploited to enable full remote code execution .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Foxit", "role": "releaser", "argument_pos": []}, {"argument": "118 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "its PDF reader", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Patches were released last week for Foxit Reader 9.3 and Foxit PhantomPDF 9.3 to address a huge number of issues in the programs .", "event": [{"event_trigger": "were released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Foxit PhantomPDF", "role": "vulnerable system", "argument_pos": []}, {"argument": "Foxit Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "last week", "role": "time", "argument_pos": []}, {"argument": "Patches", "role": "patch", "argument_pos": []}, {"argument": "9.3", "role": "vulnerable system version", "argument_pos": []}, {"argument": "9.3", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "This security bulletin released by Foxit provides details on the extensive list of vulnerabilities , which were discovered via internal research , end user reports , and reports from research teams .", "event": [{"event_trigger": "were discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "research teams", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "More than 118 issues were addressed , though there was some overlap , and so the number of actual bugs was lower .", "event": [{"event_trigger": "were addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "118 issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Vulnerable versions are 9.2.0.9297 and earlier , and only affect Windows users .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions are 9.2.0.9297", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "A significant number of flaws were classed as ‘ critical ’ and could allow for remote code execution – 18 were reported by Cisco Talos , all of which were dubbed high in severity .", "event": [{"event_trigger": "were reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "allow for remote code execution", "role": "capabilities", "argument_pos": []}, {"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco Talos", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Foxit added : “ For a number of reasons , including bug fixes , we always advise users to download and install the latest release .", "event": [{"event_trigger": "bug fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe 's scheduled October update for its Acrobat and Reader PDF software addresses 85 vulnerabilities , including dozens of critical flaws that allow arbitrary code execution .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "its Acrobat and Reader PDF software", "role": "vulnerable system", "argument_pos": []}, {"argument": "scheduled October update", "role": "patch", "argument_pos": []}, {"argument": "85 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "allow arbitrary code execution", "role": "issues addressed", "argument_pos": []}, {"argument": "dozens of critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The patches also address multiple privilege - escalation and information - disclosure flaws , shoring up Adobe 's PDF software further following a patch for a critical Acrobat and Reader flaw plugged two weeks ago .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The patches", "role": "patch", "argument_pos": []}, {"argument": "multiple privilege - escalation", "role": "vulnerability", "argument_pos": []}, {"argument": "information - disclosure flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "PDF software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs affect Acrobat DC and Reader versions 2018.011.20063 and earlier from Adobe 's continuous track , Acrobat 2017 and Acrobat Reader 2017 2017.011.30102 , and Acrobat DC and Reader DC versions 2015.006.30452 and earlier from Adobe 's classic 2015 track .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Acrobat DC and Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat 2017", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat DC and Reader DC", "role": "vulnerable system", "argument_pos": []}, {"argument": "Acrobat Reader 2017", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 2018.011.20063", "role": "vulnerable system version", "argument_pos": []}, {"argument": "2017.011.30102", "role": "vulnerable system version", "argument_pos": []}, {"argument": "versions 2015.006.30452", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Adobe", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Adobe", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "The flaws affect the software running on Windows and macOS systems .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS systems", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "This update is the largest set of fixes Adobe 's PDF software since it swatted 105 vulnerabilities in July .", "event": [{"event_trigger": "swatted", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "105 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "July", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "However , fortunately the company says it is not currently aware of any exploits in the wild for bugs fixed in this update .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This happened earlier this year , prompting a warning from Adobe in May after it was informed by researchers at ESET and Microsoft that they 'd discovered a malicious PDF using a zero - day remote code execution flaw in Reader with a sandbox - busting Windows privilege escalation flaw .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a zero - day remote code execution flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "they", "role": "discoverer", "argument_pos": []}, {"argument": "a sandbox - busting Windows privilege escalation flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe credits researchers from Qihoo 360 , Cisco Talos , Beihang University , Palo Alto Networks , and Check Point for reporting flaws patched in the October update .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the October update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Check Point researcher Omri Herscovici was responsible for reporting 35 of this month 's bugs , all of which were information disclosure flaws .", "event": [{"event_trigger": "reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Check Point researcher Omri Herscovici", "role": "discoverer", "argument_pos": []}, {"argument": "35 of this month 's bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "information disclosure flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has posted an update to address 85 CVE - listed security vulnerabilities in Acrobat and Reader for both Windows and macOS .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "85 CVE - listed security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Acrobat and Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "The PDF apps have received a major update that includes dozens of fixes for flaws that would allow for remote code execution attacks if exploited .", "event": [{"event_trigger": "have received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The PDF apps", "role": "vulnerable system", "argument_pos": []}, {"argument": "a major update", "role": "patch", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "allow for remote code execution attacks", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "For Mac and Windows Acrobat / Reader DC users , the fixes will be present in versions 2019.008.20071 .", "event": [{"event_trigger": "will be present", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the fixes", "role": "patch", "argument_pos": []}, {"argument": "versions 2019.008.20071", "role": "patch number", "argument_pos": []}, {"argument": "Acrobat / Reader DC", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "Mac", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "For those using the older Acrobat and Reader 2017 versions , the fix will be labeled 2017.011.30105 .", "event": [{"event_trigger": "will be labeled", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "2017.011.30105", "role": "patch number", "argument_pos": []}, {"argument": "the fix", "role": "patch", "argument_pos": []}, {"argument": "Acrobat and Reader 2017", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In total , Adobe credited 19 different researchers with discovering and reporting the vulnerabilities .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "different researchers", "role": "discoverer", "argument_pos": []}, {"argument": "Adobe", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Among the more prolific bug hunters were Omri Herscovici of CheckPoint Software , who was credited for finding and reporting 35 CVE - listed bugs , and Ke Liu and Tencent Security Xuanwu Lab , who was credited with finding 11 of the patched Adobe vulnerabilities .", "event": [{"event_trigger": "finding", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Omri Herscovici", "role": "discoverer", "argument_pos": []}, {"argument": "CheckPoint Software", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "We had an Adobe Acrobat & Reader update released yesterday that fixed 86 vulnerabilities , including numerous critical ones .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "yesterday", "role": "time", "argument_pos": []}, {"argument": "an Adobe Acrobat & Reader update", "role": "patch", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Not to be beaten , an update for Foxit PDF Reader and Foxit PhantomPDF was released last Friday that fixes a whopping 116 vulnerabilities , with 18 of them being discovered by the Cisco Talos group .", "event": [{"event_trigger": "fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a whopping 116 vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "All of the 18 vulnerabilities found by Cisco Talos , as well as many others fixed by this update , are labeled as critical because they could lead to code execution .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "this update", "role": "patch", "argument_pos": []}, {"argument": "lead to code execution", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "This would allow attackers to create specially crafted web pages or PDFs that could exploit these vulnerabilities to execute commands or install malware on vulnerable computers .", "event": [{"event_trigger": "create", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "crafted web pages", "role": "trusted entity", "argument_pos": []}, {"argument": "PDFs", "role": "tool", "argument_pos": []}, {"argument": "exploit these vulnerabilities", "role": "attack pattern", "argument_pos": []}, {"argument": "execute commands", "role": "purpose", "argument_pos": []}, {"argument": "install malware", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Of the 18 vulnerabilities disclosed by Cisco , 12 of them could be exploited simply by visiting a web site when the Foxit PDF browser plugin is enabled .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "discoverer", "argument_pos": []}, {"argument": "the 18 vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Foxit suggests that all users of Foxit PDF Reader and Foxit PhantomPDF upgrade to version 9.3 to resolve these vulnerabilities .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "version 9.3", "role": "patch number", "argument_pos": []}, {"argument": "Foxit PhantomPDF", "role": "vulnerable system", "argument_pos": []}, {"argument": "Foxit PDF Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Foxit", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The full list of patched vulnerabilities is below and more information about who discovered the vulnerabilities can be found in Foxit 's security bulletin .", "event": [{"event_trigger": "can be found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Foxit", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Facebook discovered a security issue that allowed hackers to access information that could have let them take over around 50 million accounts , the company announced on Friday .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Facebook", "role": "discoverer", "argument_pos": []}, {"argument": "a security issue", "role": "vulnerability", "argument_pos": []}, {"argument": "allowed hackers to access information", "role": "capabilities", "argument_pos": []}, {"argument": "let them take over around 50 million accounts", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Facebook said it fixed the issue on Thursday night and has notified law enforcement including the FBI and the Irish Data Protection Commission in order to any address General Data Protection Regulation ( GDPR ) issues .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "Facebook", "role": "releaser", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "Thursday night", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Admins can now grab Cisco 's updates for 13 high - severity flaws affecting gear that uses its IOS and IOS XE networking software .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "13 high - severity flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "gear", "role": "vulnerable system", "argument_pos": []}, {"argument": "networking software", "role": "vulnerable system", "argument_pos": []}, {"argument": "IOS", "role": "supported platform", "argument_pos": []}, {"argument": "IOS XE", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "The company also has fixes available for 11 more flaws outlined in 10 advisories with a medium - severity rating , most of which also address issues in IOS and IOS XE , the Linux - based train of Cisco 's popular networking operating system .", "event": [{"event_trigger": "available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "11 more flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "The company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The company reported this week that some IOS XE releases were among 88 Cisco products vulnerable to the DoS attack on Linux systems known as FragmentSmack .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The company", "role": "discoverer", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "Cisco products", "role": "vulnerable system", "argument_pos": []}, {"argument": "the DoS attack", "role": "capabilities", "argument_pos": []}, {"argument": "FragmentSmack", "role": "vulnerability", "argument_pos": []}, {"argument": "IOS XE releases", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Linux systems", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "And earlier this month it plugged a critical hard - coded password bug in its video surveillance software .", "event": [{"event_trigger": "plugged", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "a critical hard - coded password bug", "role": "vulnerability", "argument_pos": []}, {"argument": "its video surveillance software", "role": "vulnerable system", "argument_pos": []}, {"argument": "earlier this month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Some of the higher severity flaws include a DoS flaw affecting the IOS XE Web UI , which could allow a remote attacker to trigger a reload of the device by sending special HTTP requests to the UI .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a DoS flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the higher severity flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the IOS XE Web UI", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow a remote attacker to trigger a reload of the device", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "This flaw affects six ASR 1000 Series Aggregation Services Routers , and two 4000 Series Integrated Routers .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "ASR 1000 Series Aggregation Services Routers", "role": "vulnerable system", "argument_pos": []}, {"argument": "This flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "4000 Series Integrated Routers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco notes that its software is affected if the system has been modified from its default state and configured to terminate IPsec VPN connections , such as LAN - to - LAN VPN , and remote access VPN , but not SSL VPN .", "event": [{"event_trigger": "notes", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Jann Horn , the Google Project Zero researcher who discovered the Meltdown and Spectre CPU flaws , has a few words for maintainers of Ubuntu and Debian : raise your game on merging kernel security fixes , you 're leaving users exposed for weeks .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Jann Horn", "role": "discoverer", "argument_pos": []}, {"argument": "the Meltdown", "role": "vulnerability", "argument_pos": []}, {"argument": "Spectre CPU flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Google Project Zero researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The kernel bug is a cache invalidation flaw in Linux memory management that has been tagged as CVE -2018-17182 , reported to Linux kernel maintainers on September 12 .", "event": [{"event_trigger": "has been tagged as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-17182", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Linux memory management", "role": "vulnerable system", "argument_pos": []}, {"argument": "The kernel bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a cache invalidation flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Linux founder Linus Torvalds fixed it in his upstream kernel tree two weeks ago , an impressively fast single day after Horn reported the issue .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Horn", "role": "discoverer", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "And within days it was also fixed in the upstream stable kernel releases 4.18.9 , 4.14.71 , 4.9.128 , and 4.4.157 .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}, {"argument": "releases 4.18.9", "role": "patch number", "argument_pos": []}, {"argument": "4.14.71", "role": "patch number", "argument_pos": []}, {"argument": "4.9.128", "role": "patch number", "argument_pos": []}, {"argument": "4.4.157", "role": "patch number", "argument_pos": []}, {"argument": "upstream stable kernel", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "However , end users of Linux distributions are n't protected until each distribution merges the changes from upstream stable kernels , and then users install that updated release .", "event": [{"event_trigger": "updated release", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Between those two points , the issue also gets exposure on public mailing lists , giving both Linux distributions and would - be attackers a chance to take action .", "event": [{"event_trigger": "exposure on public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" The security issue was announced on the oss - security mailing list on 2018-09-18 , with a CVE allocation on 2018-09-19 , making the need to ship new distribution kernels to users clearer , \" Horn wrote in a Project Zero post published Wednesday .", "event": [{"event_trigger": "was announced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The security issue", "role": "vulnerability", "argument_pos": []}, {"argument": "2018-09-18", "role": "time", "argument_pos": []}, {"argument": "2018-09-19", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "But as he noted , as of Wednesday , Debian stable and Ubuntu releases 16.04 and 18.04 had not fixed the issue , with the latest kernel update occurring around a month earlier .", "event": [{"event_trigger": "had not fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "18.04", "role": "patch number", "argument_pos": []}, {"argument": "releases 16.04", "role": "patch number", "argument_pos": []}, {"argument": "Debian", "role": "releaser", "argument_pos": []}, {"argument": "Ubuntu", "role": "vulnerable system", "argument_pos": []}, {"argument": "the latest kernel update", "role": "patch", "argument_pos": []}, {"argument": "month earlier", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "This means there 's a gap of several weeks between the flaw being publicly disclosed and fixes reaching end users .", "event": [{"event_trigger": "being publicly disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "However , the Fedora project was a little faster , pushing a fix to users on 22 September .", "event": [{"event_trigger": "pushing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "22 September", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Canonical , the UK company that maintains Ubuntu , has since responded to Horn 's blog , and says fixes \" should be released \" around Monday , October 1 .", "event": [{"event_trigger": "should be released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "October 1", "role": "time", "argument_pos": []}, {"argument": "Canonical", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Apple has issued an update to fix a number of issues in macOS Mojave leading to arbitrary code execution , the ability to read restricted memory and access local users Apple IDs among others .", "event": [{"event_trigger": "has issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "All were patched with the release of macOS Mojave 10.14 on Sept 24 .", "event": [{"event_trigger": "were patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the release", "role": "patch", "argument_pos": []}, {"argument": "10.14", "role": "patch number", "argument_pos": []}, {"argument": "Sept 24", "role": "time", "argument_pos": []}, {"argument": "macOS Mojave", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "applePatchapplePatch The first issue , CVE -2018-5383 , impacted a number of iMac , MacBook Air , Mac Pro and Mac mini server products .", "event": [{"event_trigger": "impacted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-5383", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The first issue", "role": "vulnerability", "argument_pos": []}, {"argument": "iMac", "role": "vulnerable system", "argument_pos": []}, {"argument": "MacBook Air", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mac Pro", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mac mini server products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "An input validation issue existed in Bluetooth was fixed that could have allowed an attacker in a privileged network position to intercept Bluetooth traffic .", "event": [{"event_trigger": "existed in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Bluetooth", "role": "vulnerable system", "argument_pos": []}, {"argument": "An input validation issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The App Store also patched CVE -2018-4324 , an issue in the handling of Apple ID that could have been exploited by a malicious application that would expose the Apple ID of the computer ’s owner .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-4324", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "an issue", "role": "vulnerability", "argument_pos": []}, {"argument": "The App Store", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Also , a validation issue that could expose Apple IDs was in Auto Unlock that was patched with improved validation of the process entitlement .", "event": [{"event_trigger": "was patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "expose Apple IDs", "role": "issues addressed", "argument_pos": []}, {"argument": "a validation issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-4353 impacted the application firewall where a sandboxed process may be able to circumvent sandbox restrictions , but this was addressed by adding additional restrictions .", "event": [{"event_trigger": "was addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "In Crash Reporter a validation issue , CVE -2018-4333 , was addressed that if exploited would allow a malicious application to read restricted memory .", "event": [{"event_trigger": "was addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "allow a malicious application to read restricted memory", "role": "issues addressed", "argument_pos": []}, {"argument": "CVE -2018-4333", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a validation issue", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Two Kernel problems were fixed , CVE -2018-4336 and CVE -2018-4344 , that could let an application may be able to execute arbitrary code with kernel privileges .", "event": [{"event_trigger": "were fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "able to execute arbitrary code with kernel privileges", "role": "issues addressed", "argument_pos": []}, {"argument": "CVE -2018-4336", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-4344", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Two Kernel problems", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The final problem , CVE -2016-1777 , effected Security where an attacker could exploit a weaknesses in the RC4 cryptographic algorithm and was fixed by removing RC4 .", "event": [{"event_trigger": "was fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "could exploit a weaknesses in the RC4 cryptographic algorithm", "role": "issues addressed", "argument_pos": []}, {"argument": "CVE -2016-1777", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The final problem", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "If your paycheck hits your bank account through direct deposit , be on the lookout for emails requesting personal information including log - in credentials -- they could be a phishing scam by hackers who want to access your bank account .", "event": [{"event_trigger": "phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "want to access your bank account", "role": "purpose", "argument_pos": []}, {"argument": "requesting personal information", "role": "purpose", "argument_pos": []}, {"argument": "emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "What is phishing ?", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "It 's a scam that involves targeting employees through phony emails designed to bait the reader - hence the word \" phishing \" - and capture their login credentials .", "event": [{"event_trigger": "designed to bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the reader", "role": "victim", "argument_pos": []}, {"argument": "capture their login credentials", "role": "purpose", "argument_pos": []}, {"argument": "phony emails", "role": "tool", "argument_pos": []}, {"argument": "employees", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Bristol Airport authorities were recently forced to take their flight information system displays offline for two days to contain a ransomware attack .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "their flight information system", "role": "victim", "argument_pos": []}, {"argument": "Bristol Airport authorities", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The authorities dismissed the ransom demand and decided to rebuild the affected systems .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The authorities", "role": "victim", "argument_pos": []}, {"argument": "systems", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The servers of the US - based PGA were reportedly hit by ransomware attacks right before the PGA Championship in the first week of August .", "event": [{"event_trigger": "hit by ransomware", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The servers", "role": "victim", "argument_pos": []}, {"argument": "the first week of August", "role": "time", "argument_pos": []}, {"argument": "the US - based PGA", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A new ransomware called Everlasting Blue Blackmail Virus , which targets Windows PCs using spam and phishing campaigns , flashes former US President Barrack Obama ’s image with the ransom message .", "event": [{"event_trigger": "phishing campaigns", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "exe ( executable ) files and encrypts them , preventing users from running apps until the ransom is paid .", "event": [{"event_trigger": "the ransom is paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "preventing users from running apps", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Hot on the heels of the cyberattack on the town of Valdez in Alaska , Canadian town Midland in Ontario was hit by a ransomware attack in the first week of September .", "event": [{"event_trigger": "was hit by a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Ontario", "role": "place", "argument_pos": []}, {"argument": "Canadian town Midland", "role": "victim", "argument_pos": []}, {"argument": "Alaska", "role": "place", "argument_pos": []}, {"argument": "the first week of September", "role": "time", "argument_pos": []}, {"argument": "the town of Valdez", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Hackers broke into the city database involving fire , water , and waste management and blocked access , demanding ransom .", "event": [{"event_trigger": "demanding ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Hackers", "role": "attacker", "argument_pos": []}, {"argument": "broke into the city database", "role": "attack pattern", "argument_pos": []}, {"argument": "blocked access", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "According to Ponemon Institute , 35 % of all cyberattacks in 2018 were fileless , while security solution provider Carbon Black claims that fileless attacks accounted for 50 % of all successful data breaches targeting financial businesses .", "event": [{"event_trigger": "data breaches", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "financial businesses", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Cybercriminals are finding it more difficult to maintain the malicious URLs and deceptive domains used for phishing attacks for more than a few hours because action is being taken to remove them from the internet much more quickly .", "event": [{"event_trigger": "phishing attacks", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Cybercriminals", "role": "attacker", "argument_pos": []}, {"argument": "maintain the malicious URLs and deceptive domains", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "That does n't mean that phishing -- one of the most common means of performing cyber-attacks -- is any less dangerous , but a faster approach to dealing with the issue is starting to hinder attacks .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Deceptive domain names look like those of authentic services , so that somebody who clicks on a malicious link may not realise they are n't visiting the real website of the organisation being spoofed .", "event": [{"event_trigger": "look like", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Deceptive domain names", "role": "tool", "argument_pos": []}, {"argument": "authentic services", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "One of the most common agencies to be imitated by cyber-attackers around the world is that of government tax collectors .", "event": [{"event_trigger": "be imitated", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "cyber-attackers", "role": "attacker", "argument_pos": []}, {"argument": "government tax collectors", "role": "trusted entity", "argument_pos": []}, {"argument": "common agencies", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The idea behind such attacks is that people will be tricked into believing they are owed money by emails claiming to be from the taxman .", "event": [{"event_trigger": "will be tricked", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "However , no payment ever comes , and if a victim falls for such an attack , they 're only going to lose money when their bank details are stolen , and they can even have their personal information compromised .", "event": [{"event_trigger": "compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "their personal information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "In order to combat phishing and other forms of cyber-attack , the UK 's National Cyber Crime Centre -- the internet security arm of GCHQ -- launched what it called the Active Cyber Defence programme a year ago .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "It appears to have some success in its first 12 months because , despite a rise in registered fraudulent domains , the lifespan of a phishing URL has been reduced and the number of global phishing attacks being carried out by UK - hosted sites has declined from five percent to three percent .", "event": [{"event_trigger": "phishing attacks", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "UK - hosted sites", "role": "trusted entity", "argument_pos": []}, {"argument": "phishing URL", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "During that time , 121,479 phishing sites hosted in the UK , and 18,067 worldwide spoofing UK government , were taken down , with many of them purporting to be HMRC and linked to phishing emails in the form of tax refund scams .", "event": [{"event_trigger": "spoofing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "UK government", "role": "trusted entity", "argument_pos": []}, {"argument": "UK", "role": "place", "argument_pos": []}, {"argument": "phishing sites", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Prior to the launch of the program , the average time a phishing website spoofing a UK government website remained active was for 42 hours -- or almost two days .", "event": [{"event_trigger": "spoofing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "a UK government website", "role": "trusted entity", "argument_pos": []}, {"argument": "a phishing website", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "However , while this does mean there 's less time for the attackers to steal information or finances , it does n't mean that they 're not successful in carrying out attacks .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "information", "role": "compromised data", "argument_pos": []}, {"argument": "the attackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The increased number of registered domains for carrying out phishing attacks shows that crooks are happy to work a little bit harder in order to reap the rewards of campaigns -- and the NCSC is n't under any illusion that the job of protecting internet users is anywhere near complete .", "event": [{"event_trigger": "phishing attacks", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "crooks", "role": "attacker", "argument_pos": []}, {"argument": "registered domains", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Obviously , phishing and web - inject attacks are not connected to the UK 's IP space and most campaigns of these types are hosted elsewhere .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Paul Davis , retail fraud director at Lloyds Banking Group , told Money Mail criminals can mimic the exact format of messages – which appear as though they are sent from a bank ’s number using a technique called ‘ spoofing ’ .", "event": [{"event_trigger": "are sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "number", "role": "trusted entity", "argument_pos": []}, {"argument": "bank", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "With fake banking texts now so difficult to spot , Mr Davis said customers should be taught how to respond to them to avoid being lured into a scam .", "event": [{"event_trigger": "being lured", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "fake banking texts", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The Daily Mail is campaigning for fairer treatment for customers who fall prey to so - called authorised push payment fraud – sophisticated scams where victims are tricked into transferring money .", "event": [{"event_trigger": "are tricked", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "transferring money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The 10.14 incarnation of macOS , known as Mojave , has been released into general availability .", "event": [{"event_trigger": "has been released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mojave", "role": "patch", "argument_pos": []}, {"argument": "macOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "incarnation", "role": "patch", "argument_pos": []}, {"argument": "10.14", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "It includes new features , interface updates , and security patches – though at least one hole was left unpatched .", "event": [{"event_trigger": "left unpatched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Nestled into the Mojave update was a patch bundle that addresses more than a half - dozen security holes .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a half - dozen security holes", "role": "vulnerability", "argument_pos": []}, {"argument": "a patch bundle", "role": "patch", "argument_pos": []}, {"argument": "the Mojave update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "That ' 4344 flaw was discovered by eggheads at the UK government 's eavesdropping nerve center , GCHQ .", "event": [{"event_trigger": "was discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "' 4344 flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "eggheads", "role": "discoverer", "argument_pos": []}, {"argument": "the UK government", "role": "discoverer", "argument_pos": []}, {"argument": "eavesdropping nerve center , GCHQ", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Seemingly , these patches are only available for macOS 10.14 – however , previous versions of the operating system were fixed up last week .", "event": [{"event_trigger": "are only available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these patches", "role": "patch", "argument_pos": []}, {"argument": "macOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "10.14", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Shortly after Mojave arrived , macOS guru Patrick Wardle dropped word of a vulnerability he discovered that would allow an attacker to bypass the privacy safeguards in Mojave that would normally prevent an unauthorized app from accessing things like users ' contact details .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Patrick Wardle", "role": "discoverer", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "allow an attacker to bypass the privacy safeguards", "role": "capabilities", "argument_pos": []}, {"argument": "macOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mojave", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Here 's a video of the exploit ... Wardle said he has reported the bug to Apple , but will not release details beyond the proof - of - concept video until a fix can be released .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Wardle", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The Bitcoin Core team yesterday released a patch for a DDoS vulnerability that could prove fatal to the Bitcoin network .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Bitcoin Core team", "role": "releaser", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "a DDoS vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the Bitcoin network", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The patch note urged miners to shut down their older versions urgently and replace them with the new version , Bitcoin Core 0.16.3 .", "event": [{"event_trigger": "replace", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "0.16.3", "role": "patch number", "argument_pos": []}, {"argument": "The patch", "role": "patch", "argument_pos": []}, {"argument": "Bitcoin Core", "role": "vulnerable system", "argument_pos": []}, {"argument": "older versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "new version", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "The announcement , first reported on Hacked , revealed that all the recent Bitcoin Core versions could be vulnerable to Distributed Denial - of - Service attack .", "event": [{"event_trigger": "could be vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Distributed Denial - of - Service attack", "role": "capabilities", "argument_pos": []}, {"argument": "the recent Bitcoin Core versions", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The recent DDoS vulnerability , termed as CVE -2018-17144 , tried to attempt the latter – flooding full node operators with traffic .", "event": [{"event_trigger": "termed as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The recent DDoS vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-17144", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "flooding full node operators with traffic", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "It also means that the miners who occasionally run Bitcoin Core were not vulnerable to the attack .", "event": [{"event_trigger": "were not vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Bitcoin Core", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Still , developers recommended all the miners to go ahead with the latest update to stay safe .", "event": [{"event_trigger": "recommended", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest update", "role": "patch", "argument_pos": []}, {"argument": "developers", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Also , the patch fixed some other minor bugs related to consensus , RPC , invalid flag errors , and documentation .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}, {"argument": "minor bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Flaws have been found in other cryptocurrency clients as well , including Bitcoin Cash and Ethereum .", "event": [{"event_trigger": "have been found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "cryptocurrency clients", "role": "vulnerable system", "argument_pos": []}, {"argument": "Bitcoin Cash", "role": "vulnerable system", "argument_pos": []}, {"argument": "Ethereum", "role": "vulnerable system", "argument_pos": []}, {"argument": "Flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has patched a set of severe vulnerabilities which could lead to remote code execution in the Cisco Webex Network Recording Player for Advanced Recording Format ( ARF ) .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a set of severe vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "the Cisco Webex Network Recording Player", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The security flaws , CVE -2018-15414 , CVE -2018-15421 , and CVE -2018-15422 , have been issued a base score of 7.8 .", "event": [{"event_trigger": "have been issued", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-15422", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-15421", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-15414", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "According to Cisco , each operating system is vulnerable to at least one of the security flaws .", "event": [{"event_trigger": "is vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "operating system", "role": "vulnerable system", "argument_pos": []}, {"argument": "the security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "If a victim opens a crafted , malicious file in the Cisco Webex Player -- potentially sent over email as part of a spear phishing campaign -- the bugs are triggered , leading to exploit .", "event": [{"event_trigger": "potentially sent over", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "email", "role": "tool", "argument_pos": []}, {"argument": "the Cisco Webex Player", "role": "trusted entity", "argument_pos": []}, {"argument": "a victim", "role": "victim", "argument_pos": []}, {"argument": "opens a crafted", "role": "attack pattern", "argument_pos": []}, {"argument": "malicious file", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "TechRepublic : Cisco switch flaw led to attacks on critical infrastructure in several countries There are no workarounds to address these vulnerabilities .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "However , Cisco has developed patches to automatically update vulnerable software .", "event": [{"event_trigger": "has developed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco is not aware of any reports of any active exploits in the wild .", "event": [{"event_trigger": "aware", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "exploits", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Steven Seeley from Source Incite and Ziad Badawi , working together with the Trend Micro Zero Day Initiative , have been credited with finding and reporting the bugs .", "event": [{"event_trigger": "finding and reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "the Trend Micro Zero Day Initiative", "role": "discoverer", "argument_pos": []}, {"argument": "Ziad Badawi", "role": "discoverer", "argument_pos": []}, {"argument": "Steven Seeley", "role": "discoverer", "argument_pos": []}, {"argument": "Source Incite", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In related news this week , Trend Micro 's Zero Day Initiative disclosed a Microsoft Jet zero - day vulnerability which was unpatched at the point of public disclosure .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a Microsoft Jet zero - day vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Trend Micro 's Zero Day Initiative", "role": "discoverer", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "If exploited , the vulnerability permits attackers to remotely execute code on infected machines .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "remotely execute code on infected machines", "role": "capabilities", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The Bitcoin Core developers recently fixed a major vulnerability in the Bitcoin ( BTC ) network ’s ( client ) codebase .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Bitcoin Core developers", "role": "releaser", "argument_pos": []}, {"argument": "a major vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the Bitcoin ( BTC ) network ’s ( client ) codebase", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Explaining the potentially serious nature of the software bug , which is tracked as CVE -2018-17144 and classified as a denial - of - service ( DoS ) attack , Casaba Security co-founder Jason Glassberg said : “ [ It ] can take down the network . ”", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Casaba Security co-founder Jason Glassberg", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Glassberg also told ZDNet the vulnerability in the Bitcoin Core codebase “ would [ have ] affected transactions in the sense that they can not be completed , but does not appear to open up a way to steal or manipulate wallets . ”", "event": [{"event_trigger": "told", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Glassberg", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the Bitcoin Core codebase", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Denial - of - Service ( DoS ) , 51 % Attacks The Bitcoin Core client software is used by BTC miners to validate transactions on the cryptocurrency ’s blockchain and the recent vulnerability found in its source code could have been used to intentionally crash bitcoin ’s full - node operators .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the recent vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Although not logistically feasible , this particular software bug could have been remotely exploited by an attacker to launch a 51 % attack in which one entity controls the majority of the hashing ( or computing ) power of a cryptocurrency network .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "software bug", "role": "vulnerability", "argument_pos": []}, {"argument": "cryptocurrency network", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Advisory Notice , Critical Patch Released In most cases , a bad actor has orchestrated a 51 % attack in order to manipulate transactions on a cryptocurrency ’s blockchain for financial gains .", "event": [{"event_trigger": "Critical Patch Released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "However , if the recent Bitcoin Core software bug had not been patched , a bad actor could have initiated a 51 % attack on the cryptocurrency ’s network at a considerably lower cost .", "event": [{"event_trigger": "had not been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the recent Bitcoin Core software bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The Bitcoin Core developers posted an advisory notice ( on September 19th ) regarding this DoS vulnerability .", "event": [{"event_trigger": "posted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Bitcoin Core developers", "role": "discoverer", "argument_pos": []}, {"argument": "this DoS vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Users of Bitcoin Core have been instructed to upgrade to version 0.16.3 of the software .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "version 0.16.3", "role": "patch number", "argument_pos": []}, {"argument": "the software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Bitcoin Core", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Bitcoin Knots , one of at least 96 bitcoin forks to date , was considered vulnerable as well and its client software was patched .", "event": [{"event_trigger": "was patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "its client software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "\" Copycat \" Cryptos Are At Risk Notably , the CVE -2018-17144 vulnerability could have also affected the litecoin ( LTC ) network but its client has received a patch .", "event": [{"event_trigger": "have also affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the litecoin ( LTC ) network", "role": "vulnerable system", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-17144", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Commenting on the serious nature of these software bugs , Cornell computer science professor Emin Gün Sirer said : “ Copycat currencies are at risk ” - meaning that all bitcoin forks are vulnerable to the attack .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cornell computer science professor Emin Gün Sirer", "role": "discoverer", "argument_pos": []}, {"argument": "these software bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The Turkish - American cryptographer , who identified critical vulnerabilities in Ethereum ’s codebase before its network was hit with the DAO attack , was referring to all the currently 69 active bitcoin forks that could still be exploited with a 51 % attack as their clients might still not have received a patch and are not as secure as bitcoin network due to their smaller size .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "A security researcher has published details of a vulnerability in a popular cloud storage drive after the company failed to issue security patches for over a year .", "event": [{"event_trigger": "has published", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "a popular cloud storage drive", "role": "vulnerable system", "argument_pos": []}, {"argument": "A security researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Remco Vermeulen found a privilege escalation bug in Western Digital ’s My Cloud devices , which he said allows an attacker to bypass the admin password on the drive , gaining “ complete control ” over the user ’s data .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a privilege escalation bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Remco Vermeulen", "role": "discoverer", "argument_pos": []}, {"argument": "My Cloud devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "Western Digital", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Details of the bug were also independently found by another security team , which released its own exploit code .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security team", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "exploit code", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Vermeulen reported the bug over a year ago , in April 2017 , but said the company stopped responding .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Vermeulen", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "over a year ago", "role": "time", "argument_pos": []}, {"argument": "April 2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "After he found that WD updated the My Cloud firmware in the meanwhile without fixing the vulnerability he found , he decided to post his findings .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "he", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "A year later , WD still has n’t released a patch .", "event": [{"event_trigger": "has n’t released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "A year later", "role": "time", "argument_pos": []}, {"argument": "WD", "role": "releaser", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The company confirmed that it knows of the vulnerability but did not say why it took more than a year to issue a fix .", "event": [{"event_trigger": "knows", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "“ We are in the process of finalizing a scheduled firmware update that will resolve the reported issue , ” a spokesperson said , which will arrive “ within a few weeks . ”", "event": [{"event_trigger": "will resolve", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the reported issue", "role": "vulnerability", "argument_pos": []}, {"argument": "a scheduled firmware update", "role": "patch", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "WD said that several of its My Cloud products are vulnerable — including the EX2 , EX4 and Mirror , but not My Cloud Home .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "its My Cloud products", "role": "vulnerable system", "argument_pos": []}, {"argument": "the EX2", "role": "vulnerable system", "argument_pos": []}, {"argument": "EX4", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mirror", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "A zero - day vulnerability present in security cameras and surveillance equipment using Nuuo software is thought to impact hundreds of thousands of devices worldwide .", "event": [{"event_trigger": "impact", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "devices", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers from cybersecurity firm Tenable disclosed the bug , which has been assigned as CVE -2018-1149 .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Researchers", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-1149", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "cybersecurity firm Tenable", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Dubbed \" Peekaboo , \" the zero - day stack buffer overflow vulnerability , when exploited , allows threat actors to view and tamper with video surveillance recordings and feeds .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "zero - day stack buffer overflow vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Peekaboo", "role": "vulnerability", "argument_pos": []}, {"argument": "allows threat actors to view and tamper with video surveillance recordings and feeds", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "It is also possible to use the bug to steal data including credentials , IP addresses , port usage , and the make & models of connected surveillance devices .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "use the bug", "role": "attack pattern", "argument_pos": []}, {"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "credentials", "role": "compromised data", "argument_pos": []}, {"argument": "IP addresses", "role": "compromised data", "argument_pos": []}, {"argument": "port usage", "role": "compromised data", "argument_pos": []}, {"argument": "the make & models", "role": "compromised data", "argument_pos": []}, {"argument": "surveillance devices", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Peekaboo specifically impacts the NVRMini 2 NAS and network video recorder , which acts as a hub for connected surveillance products .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Peekaboo", "role": "vulnerability", "argument_pos": []}, {"argument": "NVRMini 2 NAS", "role": "vulnerable system", "argument_pos": []}, {"argument": "network video recorder", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Tenable disclosed the zero - day vulnerability to Nuuo .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Nuuo", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the zero - day vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Tenable", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "A patch has not been released , but Nuuo is currently developing a fix for deployment .", "event": [{"event_trigger": "is currently developing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "Nuuo", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "A plugin has also been released by Tenable for organizations to assess whether or not they are vulnerable to Peekaboo .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Peekaboo", "role": "vulnerability", "argument_pos": []}, {"argument": "they", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "organizations", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "A GandCrab ransomware attack , combined with a Comcast outage , caused a Florida Keys school district ’s computer system to be down for a week .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "computer system", "role": "victim", "argument_pos": []}, {"argument": "GandCrab", "role": "tool", "argument_pos": []}, {"argument": "Florida Keys school district", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The computer system in a Florida Keys school district were down for a week due to a ransomware attack .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The computer system", "role": "victim", "argument_pos": []}, {"argument": "a Florida Keys school district", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Monroe County School District was the victim of a GandCrab ransomware attack .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Monroe County School District", "role": "victim", "argument_pos": []}, {"argument": "the victim", "role": "victim", "argument_pos": []}, {"argument": "GandCrab", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Monroe County School District claimed there were no ransom demands , but since ransomware locks up a system and demands payment to retrieve a decryption key for encrypted files , perhaps the district meant it did n’t cave to extortion ?", "event": [{"event_trigger": "ransom demands", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Monroe County School District", "role": "victim", "argument_pos": []}, {"argument": "ransomware", "role": "tool", "argument_pos": []}, {"argument": "locks up a system", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Last month , Microsoft Patch Tuesday addressed 60 vulnerabilities that also included two zero - day flaws .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "60 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "two zero - day flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Last month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "This month also , the tech giant released a huge patch update to mitigate various flaws in its products .", "event": [{"event_trigger": "mitigate", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "various flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "its products", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The Microsoft September patch fixed around 61 different vulnerabilities .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "61 different vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Recently , a zero - day vulnerability disclosed on Twitter has created a lot of chaos as it was immediately exploited in a malware campaign .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a malware campaign", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The APLC zero - day flaw gained attention after a Twitter user with the alias SandboxEscaper disclosed it in a tweet .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}, {"argument": "the alias SandboxEscaper", "role": "discoverer", "argument_pos": []}, {"argument": "a Twitter user", "role": "discoverer", "argument_pos": []}, {"argument": "The APLC zero - day flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Later , a CERT / CC researcher verified the bug .", "event": [{"event_trigger": "verified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a CERT / CC researcher", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "As promised at that time by the firm , the Microsoft September patch has addressed this Advanced Local Procedure Call ( ALPC ) flaw .", "event": [{"event_trigger": "has addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Advanced Local Procedure Call ( ALPC ) flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "As disclosed in their advisory , Microsoft acknowledged the exploitation of this vulnerability ( CVE -2018-8440 ) .", "event": [{"event_trigger": "acknowledged", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-8440", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Explaining the details about the bug and the patch released , Microsoft states , “ To exploit this vulnerability , an attacker would first have to log on to the system .", "event": [{"event_trigger": "the patch released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The update addresses the vulnerability by correcting how Windows handles calls to ALPC . ”", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "ALPC", "role": "vulnerable system", "argument_pos": []}, {"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "Windows", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Besides the single APLC zero - day flaw , Microsoft also patched 61 other flaws in various products , including 17 critical vulnerabilities .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "61 other flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "various products", "role": "vulnerable system", "argument_pos": []}, {"argument": "17 critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "the single APLC zero - day flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The affected software receiving the bug fixes include Microsoft Windows , Microsoft Edge , ChakraCore , Microsoft Office and Web Apps , Microsoft.Data.OData , Internet Explorer , ASP.NET and the .", "event": [{"event_trigger": "receiving", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The affected software", "role": "vulnerable system", "argument_pos": []}, {"argument": "the bug fixes", "role": "patch", "argument_pos": []}, {"argument": "Microsoft Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "ASP.NET", "role": "vulnerable system", "argument_pos": []}, {"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft.Data.OData", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft Edge", "role": "vulnerable system", "argument_pos": []}, {"argument": "ChakraCore", "role": "vulnerable system", "argument_pos": []}, {"argument": "Microsoft Office", "role": "vulnerable system", "argument_pos": []}, {"argument": "Web Apps", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In addition , the Microsoft September patch also addressed a flaw in the Adobe Flash Player ( CVE -2018-15967 ) .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "CVE -2018-15967", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "September", "role": "time", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Although Adobe also released a fix for this vulnerability along with other fixes released this week in the September Update pack .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "But this week , researchers at Positive Technologies revealed a new security flaw in the subsystem that could let attackers compromise its MFS file system .", "event": [{"event_trigger": "revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "a new security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the subsystem", "role": "vulnerable system", "argument_pos": []}, {"argument": "let attackers compromise its MFS file system", "role": "capabilities", "argument_pos": []}, {"argument": "Positive Technologies", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Intel has released updates to address the problem , though , so Intel CPU owners should make sure their firmware is up - to - date .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The problem is that researchers have discovered numerous vulnerabilities in ME over the last few years ; Positive Technologies revealed one in 2017 that allowed full takeover of ME via USB ( it 's since been fixed ) .", "event": [{"event_trigger": "been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Now , it 's revealed another one that allows someone with physical access to a system to compromise ME and \" manipulate the state of MFS and extract important secrets \" with the ability to \" add files , delete files and change their protection attributes . \"", "event": [{"event_trigger": "revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "allows someone with physical access to a system to compromise ME", "role": "capabilities", "argument_pos": []}, {"argument": "it", "role": "discoverer", "argument_pos": []}, {"argument": "Now", "role": "time", "argument_pos": []}, {"argument": "extract important secrets", "role": "capabilities", "argument_pos": []}, {"argument": "manipulate the state of MFS", "role": "capabilities", "argument_pos": []}, {"argument": "ability to \" add files , delete files and change their protection attributes", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Positive Technologies said the attack can be used to learn four keys MFS uses to secure data -- the Intel Integrity Key , Non-Intel Integrity Key , Intel Confidentiality Key and Non-Intel Confidentiality Key -- that were supposed to be protected via a firmware update Intel released in 2017 .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "a firmware update", "role": "patch", "argument_pos": []}, {"argument": "2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Positive Technologies explained how someone with physical access to the system could bypass that patch to compromise those keys in its blog post : \" Positive Technologies expert Dmitry Sklyarov discovered vulnerability CVE -2018-3655 , described in advisory Intel - SA - 00125 .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-3655", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "expert Dmitry Sklyarov", "role": "discoverer", "argument_pos": []}, {"argument": "Positive Technologies", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" Intel released the Intel - SA - 00125 firmware update to defend against this vulnerability on September 11 .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Intel - SA - 00125 firmware update", "role": "patch", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "September 11", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has resolved six critical updates in the company 's latest round of security fixes .", "event": [{"event_trigger": "has resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company 's latest round of security fixes", "role": "patch", "argument_pos": []}, {"argument": "six critical updates", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "On Tuesday , Adobe said in a security advisory that the update impacts ColdFusion version 11 , as well as the 2016 and 2018 releases of the web application development platform .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "ColdFusion", "role": "vulnerable system", "argument_pos": []}, {"argument": "web application", "role": "vulnerable system", "argument_pos": []}, {"argument": "Adobe", "role": "discoverer", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "version 11", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "In total , six of the security flaws are deemed critical .", "event": [{"event_trigger": "are deemed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "six of the security flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In addition , CVE -2018-15961 is a security flaw which permits unrestricted file uploads in the software , and the final critical bug , CVE -2018-15960 , is described as \" use of a component with a known vulnerability \" which can cause arbitrary file overwrite .", "event": [{"event_trigger": "described as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-15961", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "permits unrestricted file uploads", "role": "capabilities", "argument_pos": []}, {"argument": "the final critical bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15960", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "cause arbitrary file overwrite", "role": "capabilities", "argument_pos": []}, {"argument": "known vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "If exploited , all of the above security flaws can lead to arbitrary code execution .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "lead to arbitrary code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Three other bugs in ColdFusion have also been resolved .", "event": [{"event_trigger": "have also been resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "ColdFusion", "role": "vulnerable system", "argument_pos": []}, {"argument": "Three other bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe also released a fix for Adobe Flash Player on desktop Windows , macOS , and Linux machines , as well as Flash for Google Chrome on Windows , macOS , Linux , and Chrome OS , versions 30.0.0.154 and earlier .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "Flash", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 30.0.0.154 and earlier", "role": "vulnerable system version", "argument_pos": []}, {"argument": "desktop Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}, {"argument": "Linux machines", "role": "supported platform", "argument_pos": []}, {"argument": "Google Chrome", "role": "supported platform", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}, {"argument": "Linux", "role": "supported platform", "argument_pos": []}, {"argument": "Chrome OS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "This security flaw , CVE -2018-15967 is listed as an \" important \" privilege escalation bug which could lead to information disclosure .", "event": [{"event_trigger": "is listed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "lead to information disclosure", "role": "capabilities", "argument_pos": []}, {"argument": "privilege escalation bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-15967", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "This security flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Originally , Microsoft listed the same vulnerability as critical and one which enabled attackers to perform remote code execution attacks .", "event": [{"event_trigger": "listed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "discoverer", "argument_pos": []}, {"argument": "the same vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "enabled attackers to perform remote code execution attacks", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe is not aware of any reports suggesting the vulnerabilities have been exploited in the wild but recommends that users accept the automatic updates as soon as possible .", "event": [{"event_trigger": "reports suggesting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The tech giant thanked researchers including Matthias Kaiser of Code White GmbH , Gsrc from Venustech - Adlab , and Nick Bloor of Cognitous for reporting the vulnerabilities .", "event": [{"event_trigger": "reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Nick Bloor", "role": "discoverer", "argument_pos": []}, {"argument": "Gsrc from Venustech - Adlab", "role": "discoverer", "argument_pos": []}, {"argument": "Matthias Kaiser", "role": "discoverer", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "The tech giant", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "the vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Code White GmbH", "role": "discoverer", "argument_pos": []}, {"argument": "Cognitous", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "This month 's security fixes build upon Adobe 's August patch update , in which 11 security flaws were resolved , including critical vulnerabilities in Adobe Acrobat 2017 , Acrobat DC , and Acrobat Reader DC on Windows and macOS machines .", "event": [{"event_trigger": "build", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe 's August patch update", "role": "patch", "argument_pos": []}, {"argument": "This month 's security fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "In the same month , the tech giant also released an out - of - schedule patch for Adobe Photoshop CC .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe Photoshop CC", "role": "vulnerable system", "argument_pos": []}, {"argument": "an out - of - schedule patch", "role": "patch", "argument_pos": []}, {"argument": "the tech giant", "role": "releaser", "argument_pos": []}, {"argument": "the same month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The security update tackled memory corruption bugs in the creative software which , if exploited , could lead to code execution .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "lead to code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "A flaw in Safari – that allows an attacker to spoof websites and trick victims into handing over their credentials – has yet to be patched .", "event": [{"event_trigger": "spoof", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "websites", "role": "trusted entity", "argument_pos": []}, {"argument": "an attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "A browser address bar spoofing flaw was found by researchers this week in Safari – and Apple has yet issue a patch for the flaw .", "event": [{"event_trigger": "was found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A browser address bar spoofing flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "Safari", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Researcher Rafay Baloch on Monday disclosed two proof - of - concepts revealing how vulnerabilities in Edge browser 42.17134.1.0 and Safari iOS 11.3.1 could be abused to manipulate the browsers ’ address bars , tricking victims into thinking they are visiting a legitimate website .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "Researcher Rafay Baloch", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Baloch told Threatpost Wednesday that Apple has promised to fix the flaw in its next security update for Safari .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "its next security update", "role": "patch", "argument_pos": []}, {"argument": "Safari", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "“ Apple has told [ me ] that the latest beta of iOS 12 also addresses the issue , however they have n’t provided any dates , ” he said .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "iOS 12", "role": "vulnerable system", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "latest beta", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft for its part has fixed the vulnerability Baloch found in the Edge browser , ( CVE -2018-8383 ) in its August Patch Tuesday release .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "According to Microsoft ’s vulnerability advisory released August 14 , the spoofing flaw exists because Edge does not properly parse HTTP content .", "event": [{"event_trigger": "advisory released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "August 14", "role": "time", "argument_pos": []}, {"argument": "the spoofing flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "From there , the attacker could spoof the website , using it to lure in victims and potentially gather credentials or spread malware .", "event": [{"event_trigger": "spoof", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the website", "role": "trusted entity", "argument_pos": []}, {"argument": "the attacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "For instance , the attacker could send an email message containing the specially crafted URL to the user , convince the user to click it , and take them to the link which could gather their credentials or sensitive information .", "event": [{"event_trigger": "send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "an email message", "role": "tool", "argument_pos": []}, {"argument": "the attacker", "role": "attacker", "argument_pos": []}, {"argument": "the specially crafted URL", "role": "tool", "argument_pos": []}, {"argument": "the user", "role": "victim", "argument_pos": []}, {"argument": "convince the user to click it", "role": "attack pattern", "argument_pos": []}, {"argument": "gather their credentials or sensitive information", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "com/bt/Edge-Spoof.html ) , which would take him to a site purporting to be Gmail login .", "event": [{"event_trigger": "purporting to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Gmail login", "role": "trusted entity", "argument_pos": []}, {"argument": "a site", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "No other browsers – including Chrome or Firefox – were discovered to have the flaw , said Baloch .", "event": [{"event_trigger": "were discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "Chrome", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Baloch is known for discovering similar vulnerabilities in Chrome , Firefox and other major browsers in 2016 , which also allowed attackers to spoof URLs in the address bar .", "event": [{"event_trigger": "discovering", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Baloch", "role": "discoverer", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Chrome", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "other major browsers", "role": "vulnerable system", "argument_pos": []}, {"argument": "2016", "role": "time", "argument_pos": []}, {"argument": "allowed attackers to spoof URLs in the address bar", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerabilities were disclosed to both Microsoft and Apple and Baloch gave both a 90 - day deadline before he went public with the flaws .", "event": [{"event_trigger": "were disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Apple", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Microsoft", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Due to the Safari browser bug being unpatched , Baloch said he has not yet released a Proof of Concept : “ However considering there is a slight difference between the Edge browser POC and Safari , anyone with decent knowledge of Javascript can make it work on Safari , ” he told us .", "event": [{"event_trigger": "being unpatched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Safari browser bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "An amount in Bitcoin ( BTC ) is what the Canadian town of Midland is said to have paid to regain access to its hacked computer systems .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "computer systems", "role": "victim", "argument_pos": []}, {"argument": "the Canadian town of Midland", "role": "victim", "argument_pos": []}, {"argument": "in Bitcoin ( BTC )", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "The ransom that the Canadian town of Midland has paid to cyber criminals to have its servers unblocked was in the form of Bitcoin ( BTC ) , media source Global News reported last week , quoting a local spokesperson .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "cyber criminals", "role": "attacker", "argument_pos": []}, {"argument": "its servers", "role": "victim", "argument_pos": []}, {"argument": "Bitcoin ( BTC )", "role": "payment method", "argument_pos": []}, {"argument": "the Canadian town of Midland", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "How much Midland has paid in cryptocurrency , however , was not specified .", "event": [{"event_trigger": "has paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Midland", "role": "victim", "argument_pos": []}, {"argument": "in cryptocurrency", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "Right after , Midland got a ransom demand to get decryption keys .", "event": [{"event_trigger": "a ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Midland", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A privilege escalation flaw in McAfee 's True Key software remains open to exploitation despite multiple attempts to patch it .", "event": [{"event_trigger": "patch", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}, {"argument": "True Key software", "role": "vulnerable system", "argument_pos": []}, {"argument": "A privilege escalation flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "McAfee", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "This according to researchers with security shop Exodus Intel , who claim that CVE -2018-6661 was not fully addressed with either of the two patches McAfee released for it .", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-6661", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the two patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "McAfee 's summary of the flaw , published on March 30 , lists it as a ' high ' severity issue that was patched in version 4.20.110 - which was released in April .", "event": [{"event_trigger": "was patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a ' high ' severity issue", "role": "vulnerability", "argument_pos": []}, {"argument": "version 4.20.110", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Exodus says that the April release did n't fully fix the bug , however .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "April release", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "The researchers explain that McAfee 's patch only addresses one of the libraries ( SDKLibAdapter ) that would allow the attack to take place , with another DLL ( NLog logging library ) being left vulnerable to the same side - loading tactic .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the libraries ( SDKLibAdapter )", "role": "vulnerable system", "argument_pos": []}, {"argument": "patch", "role": "patch", "argument_pos": []}, {"argument": "McAfee", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Exodus said that it notified McAfee of the issue back in August , prompting a second patch that , unfortunately , also failed to fully remedy the issue .", "event": [{"event_trigger": "prompting", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a second patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "\" However , we tested the latest version available ( 5.1.173.1 as of September 7th , 2018 ) and found that it remains vulnerable requiring no changes to our exploit . \"", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "September 7th , 2018", "role": "time", "argument_pos": []}, {"argument": "5.1.173.1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "latest version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "To its credit , McAfee acknowledged the issue and said it is still working to fully resolve the flaw .", "event": [{"event_trigger": "resolve", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" McAfee has been working with the researchers to confirm their findings , and has provided customers mitigation guidance to allow them to protect themselves until the company can address the reported issues via automatic product updates , \" McAfee told The Register .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "the reported issues", "role": "vulnerability", "argument_pos": []}, {"argument": "automatic product updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "An attack called Mongo Lock is targeting remotely accessible and unprotected MongoDB databases , wiping them , and then demanding a ransom in order to get the contents back .", "event": [{"event_trigger": "demanding a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "unprotected MongoDB databases", "role": "victim", "argument_pos": []}, {"argument": "wiping them", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "According to security researcher Bob Diachenko who discovered the new Mongo Lock campaign , the attackers will connect to an unprotected database and delete it .", "event": [{"event_trigger": "the new Mongo Lock campaign", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "connect to an unprotected database and delete it", "role": "attack pattern", "argument_pos": []}, {"argument": "the attackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The Readme collection will contain a ransom note that explains that the database has been encrypted and that the victims need to pay them a ransom to get it back .", "event": [{"event_trigger": "a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "In the Mongo Lock campaign , as shown below , the attackers do not leave a bitcoin address , but rather direct the victim 's to contact them via email .", "event": [{"event_trigger": "the Mongo Lock campaign", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "a bitcoin address", "role": "payment method", "argument_pos": []}, {"argument": "the victim", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "While the ransom note claims that the attackers are exporting the database first before deleting it , it is not known if they are doing that in ever case .", "event": [{"event_trigger": "are exporting", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "the database", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Victims are paying ransoms When looking up some of the bitcoin addresses used in recent MongoDB attacks , victims have been paying the ransoms .", "event": [{"event_trigger": "have been paying the ransoms", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "bitcoin addresses", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "For example , the bitcoin address 3FAVraz3ovC1pz4frGRH6XXCuqPSWeh3UH , which has been used often , has had 3 ransom payments for a total of 1.8 bitcoins .", "event": [{"event_trigger": "ransom payments", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "1.8 bitcoins", "role": "price", "argument_pos": []}, {"argument": "bitcoin address", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "Struts bugs , Umbrella misconfig and router Guest accounts fixed .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Umbrella misconfig", "role": "vulnerability", "argument_pos": []}, {"argument": "Struts bugs", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has issued security alerts for 30 vulnerabilities across a range of its products and services , with three being ranked as critical and remotely exploitable .", "event": [{"event_trigger": "ranked", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Some 20 different Cisco products contain a vulnerable version of the Apache Struts 2 framework that is currently under active exploitation by miscreants dropping cryptocurrency miner malware on exposed systems .", "event": [{"event_trigger": "contain", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Apache Struts 2 framework", "role": "vulnerable system", "argument_pos": []}, {"argument": "dropping cryptocurrency miner malware on exposed systems", "role": "capabilities", "argument_pos": []}, {"argument": "Cisco products", "role": "supported platform", "argument_pos": []}, {"argument": "a vulnerable version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Of these , 18 are not vulnerable to any exploitation vectors for the Struts flaw , Cisco said .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Five Cisco products , SocialMiner , Identity Services Engine , Finesse , Unified Contact Centre Enterprise and the Video Distribution Suite for Internet Streaming have received patches for the Struts vulnerability .", "event": [{"event_trigger": "have received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Five Cisco products", "role": "vulnerable system", "argument_pos": []}, {"argument": "SocialMiner", "role": "vulnerable system", "argument_pos": []}, {"argument": "Identity Services Engine", "role": "vulnerable system", "argument_pos": []}, {"argument": "Finesse", "role": "vulnerable system", "argument_pos": []}, {"argument": "Unified Contact Centre Enterprise", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Video Distribution Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "the Struts vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Internet Streaming", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco 's cloud - hosted Network Performance Analysis service is yet to get a Struts update though .", "event": [{"event_trigger": "get", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "cloud - hosted Network Performance Analysis service", "role": "vulnerable system", "argument_pos": []}, {"argument": "a Struts update", "role": "patch", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability stems from insufficient authentication configurations for the Umbrella API , and has been patched by Cisco with no user action required .", "event": [{"event_trigger": "has been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "the Umbrella API", "role": "vulnerable system", "argument_pos": []}, {"argument": "The vulnerability stems", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Two high - impact vulnerabilities in the Umbrella Enterprise Roaming Client and Enterprise Roaming Module that could be exploited by attackers to elevate user privileges to Administrator level have also been patched by Cisco .", "event": [{"event_trigger": "been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "A third critical vulnerability can be exploited to run code remotely on the Cisco RV110W VPN firewall and RV130W and RV215W wireless VPN routers , or freeze the devices in denial of service attacks .", "event": [{"event_trigger": "be exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "third critical vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "denial of service attacks", "role": "capabilities", "argument_pos": []}, {"argument": "devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "Cisco RV110W VPN firewall", "role": "vulnerable system", "argument_pos": []}, {"argument": "RV130W", "role": "vulnerable system", "argument_pos": []}, {"argument": "RV215W wireless VPN", "role": "vulnerable system", "argument_pos": []}, {"argument": "routers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Patches for the vulnerability address an improper boundary restriction on input via the Guest user account in the devices ' web - based remote management interface , Cisco said .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco also patched three high impact vulnerabilities in the above network devices , which could be exploited to remotely execute arbitrary commands and read sensitive information on them .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "three high impact vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the above network devices", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Of the thirty vulnerabilities disclosed , 13 are ranked as high impact .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the thirty vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla released nine fixes in its Wednesday launch of Firefox 62 for Windows , Mac and Android – including one for a critical glitch that could enable attackers to run arbitrary code .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "nine fixes", "role": "patch", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "a critical glitch", "role": "vulnerable system", "argument_pos": []}, {"argument": "enable attackers to run arbitrary code", "role": "issues addressed", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "Mac", "role": "supported platform", "argument_pos": []}, {"argument": "Android", "role": "supported platform", "argument_pos": []}, {"argument": "62", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Overall , the latest version of the Firefox browser included fixes for the critical issue , three high - severity flaws , two moderate problems and three low - severity vulnerabilities .", "event": [{"event_trigger": "included", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Firefox browser", "role": "vulnerable system", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "the critical issue", "role": "vulnerability", "argument_pos": []}, {"argument": "three high - severity flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "two moderate problems", "role": "vulnerability", "argument_pos": []}, {"argument": "three low - severity vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "latest version", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Topping the list is a memory safety bug ( CVE -2018-12376 ) , discovered by a number of Mozilla developers and community members .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla developers", "role": "discoverer", "argument_pos": []}, {"argument": "community members", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-12376", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "a memory safety bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The memory safety problem , which exists in Firefox 61 and Firefox ESR 60 , meets these criteria , researchers said .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla did n’t release further details , but it did assign one CVE to represent multiple similar issues .", "event": [{"event_trigger": "assign one CVE", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "discoverer", "argument_pos": []}, {"argument": "it", "role": "discoverer", "argument_pos": []}, {"argument": "multiple similar issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to the memory safety bug ( s ) , Mozilla also fixed three high - severity vulnerabilities in its latest update .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "the memory safety bug ( s )", "role": "vulnerability", "argument_pos": []}, {"argument": "three high - severity vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "its latest update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Another high - severity bug ( CVE -2018-12378 ) is a use - after - free vulnerability that occurs when an IndexedDB index ( a low - level API for client - side storage of significant amounts of structured data ) is deleted while still in use by JavaScript code providing payload values .", "event": [{"event_trigger": "occurs", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "use - after - free vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-12378", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Mozilla developers and community members also found a memory - safety bug ( CVE -2018-12375 ) in Firefox 61 , which showed evidence of memory corruption and could be exploited to run arbitrary code , according to the advisory .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "community members", "role": "discoverer", "argument_pos": []}, {"argument": "Mozilla developers", "role": "discoverer", "argument_pos": []}, {"argument": "a memory - safety bug", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-12375", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "showed evidence of memory corruption", "role": "capabilities", "argument_pos": []}, {"argument": "61", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The moderate and low - severity fixes that were deployed in Firefox 62 include patches for an out - of - bounds write flaw ( triggered when the Mozilla Updater opens a MAR format file that contains a very long item filename ) ; and a proxy bypass glitch in the browser ’s proxy settings .", "event": [{"event_trigger": "were deployed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The moderate and low - severity fixes", "role": "patch", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "an out - of - bounds write flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "62", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "Firefox 62 for desktop is available for download on Mozilla ’s website .", "event": [{"event_trigger": "is available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "62 for desktop", "role": "patch number", "argument_pos": []}, {"argument": "Firefox", "role": "vulnerable system", "argument_pos": []}, {"argument": "Mozilla", "role": "releaser", "argument_pos": []}, {"argument": "website", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Google has released the September 2018 Android security update for the supported Nexus and Pixel devices .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Pixel devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "the supported Nexus", "role": "vulnerable system", "argument_pos": []}, {"argument": "Android security update", "role": "patch", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The September Android security update fixes as many as 59 issues through two different patch levels and comes as the first update for the devices running Android 9.0 Pie that the search giant released as its latest Android version last month .", "event": [{"event_trigger": "fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Android security update", "role": "patch", "argument_pos": []}, {"argument": "59 issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "It addresses vulnerabilities ranging from high to critical .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "It", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "However , Google , as usual , assures that there are no reports of users being affected by the security issues that have been fixed through the new update .", "event": [{"event_trigger": "have been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the new update", "role": "patch", "argument_pos": []}, {"argument": "the security issues", "role": "vulnerability", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Essential Products has also separately released the newest Android security update for the Essential Phone .", "event": [{"event_trigger": "has also separately released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Essential Products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Android security update", "role": "patch", "argument_pos": []}, {"argument": "the Essential Phone", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Detailing the fixes , Google in the latest security bulletin notes that the September Android security patch level dated 2018-09-01 addresses 24 issues , while the security patch level dated 2018-09-05 fixes 35 issues .", "event": [{"event_trigger": "addresses", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "24 issues", "role": "vulnerability", "argument_pos": []}, {"argument": "Android security patch", "role": "patch", "argument_pos": []}, {"argument": "2018-09-01", "role": "time", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The update fixes vulnerabilities range from high to critical , and the most severe in the list is a security issue related to the media framework that could let a remote attacker execute arbitrary code using a specially crafted file .", "event": [{"event_trigger": "fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "let a remote attacker execute arbitrary code using a specially crafted file", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Also , it fixes issues within the Android runtime , framework , and library .", "event": [{"event_trigger": "fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "library", "role": "vulnerable system", "argument_pos": []}, {"argument": "framework", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Android runtime", "role": "vulnerable system", "argument_pos": []}, {"argument": "issues", "role": "vulnerability", "argument_pos": []}, {"argument": "it", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The update improves software version reporting and audio quality over car speakers on all Pixel devices .", "event": [{"event_trigger": "improves", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "all Pixel devices", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In the early morning hours of Sept 1 , the town became the victim of a cyberattack in which the town ’s network was illegally accessed and infected with ransomware .", "event": [{"event_trigger": "a cyberattack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the early morning hours of Sept 1", "role": "time", "argument_pos": []}, {"argument": "network", "role": "victim", "argument_pos": []}, {"argument": "was illegally accessed", "role": "attack pattern", "argument_pos": []}, {"argument": "the town", "role": "victim", "argument_pos": []}, {"argument": "town", "role": "victim", "argument_pos": []}, {"argument": "infected with ransomware", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The town has received a ransom demand to decrypt them .", "event": [{"event_trigger": "a ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The town", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Ongoing investigations have not found any evidence that information was removed from the system or inappropriately accessed and cybersecurity experts are working quickly to rule out that possibility .", "event": [{"event_trigger": "was removed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the system", "role": "victim", "argument_pos": []}, {"argument": "information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The town eventually paid the hackers three Bitcoins , worth approximately $ 34,000 .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The town", "role": "victim", "argument_pos": []}, {"argument": "the hackers", "role": "attacker", "argument_pos": []}, {"argument": "three Bitcoins", "role": "price", "argument_pos": []}, {"argument": "$ 34,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "It ’s a new month which means another security patch from Google has been released and it ’s currently rolling out to Pixel and select Nexus devices .", "event": [{"event_trigger": "rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Pixel", "role": "vulnerable system", "argument_pos": []}, {"argument": "select Nexus devices", "role": "vulnerable system", "argument_pos": []}, {"argument": "it", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The September 5 , 2018 patch includes fixes for almost 60 vulnerabilities that were found in the AOSP repository .", "event": [{"event_trigger": "were found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "almost 60 vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "the AOSP repository", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Google resolved 24 problems on September 1 , 2018 , and patched an additional 35 on September 5 , 2018 .", "event": [{"event_trigger": "resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "24 problems", "role": "vulnerability", "argument_pos": []}, {"argument": "Google", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Fortunately , just like with most issues that ’re fixed through security patches , Google states that it has not received a single report of an attacker using this vulnerability to harm a customer .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security patches", "role": "patch", "argument_pos": []}, {"argument": "most issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "And in usual Essential fashion , the company has begun rolling out the September security patch to the Essential Phone within hours of it becoming available for Google ’s hardware .", "event": [{"event_trigger": "rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "the September security patch", "role": "patch", "argument_pos": []}, {"argument": "the Essential Phone", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "By zero - day , it means that a vulnerability has been exposed but it is not yet patched .", "event": [{"event_trigger": "is not yet patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "it", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Darren Allan in TechRadar was one of the tech watchers reporting on the vulnerability , which could occur through a privilege escalation bug .", "event": [{"event_trigger": "reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "TechRadar", "role": "discoverer", "argument_pos": []}, {"argument": "Darren Allan", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "through a privilege escalation bug", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "\" CERT / CC ( the US cybersecurity organization which looks to counter emerging threats ) has confirmed that this vulnerability can be leveraged against a 64 - bit Windows 10 PC which has been fully patched up to date , \" said TechRadar , in turn referring to a story in The Register , Richard Chergwin , The Register , had reported that \" CERT / CC vulnerability analyst Will Dormann quickly verified the bug . \"", "event": [{"event_trigger": "had reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CERT / CC vulnerability analyst", "role": "vulnerability", "argument_pos": []}, {"argument": "Richard Chergwin", "role": "discoverer", "argument_pos": []}, {"argument": "The Register", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" ' Microsoft Windows task scheduler contains a vulnerability in the handling of ALPC , which can allow a local user to gain SYSTEM privileges , ' the alert stated . \"", "event": [{"event_trigger": "contains", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "allow a local user to gain SYSTEM privileges", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "We have confirmed that the public exploit code works on 64 - bit Windows 10 and Windows Server 2016 systems .", "event": [{"event_trigger": "confirmed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "exploit code", "role": "vulnerability", "argument_pos": []}, {"argument": "64 - bit Windows 10", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows Server 2016 systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "We", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "We have also confirmed compatibility with 32 - bit Windows 10 with minor modifications to the public exploit code .", "event": [{"event_trigger": "confirmed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "32 - bit Windows 10", "role": "vulnerable system", "argument_pos": []}, {"argument": "exploit code", "role": "vulnerability", "argument_pos": []}, {"argument": "We", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "There ’s likely not a person reading this online who has n’t received a phishing attack , in which someone pretending to be a bank sends an email or text message , hoping to trick you into enter or re-enter account information or a credit card number .", "event": [{"event_trigger": "pretending to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "someone", "role": "attacker", "argument_pos": []}, {"argument": "a bank", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "What hit MacEwan was a spear phishing attack , in which scammers impersonate a client or associate of the individual .", "event": [{"event_trigger": "a spear phishing attack", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "MacEwan", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A phishing attacker will often cast several lures ; in this case , investigators said 14 different Edmonton - area construction sites or firms were impersonated as part of this attempt .", "event": [{"event_trigger": "were impersonated", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "firms", "role": "trusted entity", "argument_pos": []}, {"argument": "Edmonton - area construction sites", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The successful trick led to financial transfers equivalent to more than five per cent of the publicly funded school ’s 2016 operating budget , according to records .", "event": [{"event_trigger": "The successful trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "led to financial transfers", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "This inflicted vastly more damage than the last well - documented online scam to successfully target an Alberta post-secondary school : last year , University of Calgary paid $ 20,000 in what ’s known as a ransomware attack , in which cyberattackers manage to lock or encrypt network data until the victim pays up .", "event": [{"event_trigger": "paid", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 20,000", "role": "price", "argument_pos": []}, {"argument": "last year", "role": "time", "argument_pos": []}, {"argument": "University of Calgary", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Now , the school itself will become a cautionary tale about the perils and pratfalls of spear phishing cyberattacks .", "event": [{"event_trigger": "spear phishing cyberattacks", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "These were not high - level employees ensnared by this phishing attack , the school spokesman says , though he did not identify them or clarify how the three employees were involved .", "event": [{"event_trigger": "this phishing attack", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "high - level employees", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "MacEwan University said its IT systems are secure after the institution was defrauded of nearly $ 12 million in a phishing scam compounded by human error .", "event": [{"event_trigger": "was defrauded", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the institution", "role": "victim", "argument_pos": []}, {"argument": "$ 12 million", "role": "damage amount", "argument_pos": []}]}], "task": "EE"} {"text": "The university learned it was the victim of an attack last Wednesday , Aug 23 after a series of fraudulent emails “ convinced university staff to change electronic banking information for one of the university ’s major vendors . ”", "event": [{"event_trigger": "an attack", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "it", "role": "victim", "argument_pos": []}, {"argument": "The university", "role": "victim", "argument_pos": []}, {"argument": "last Wednesday , Aug 23", "role": "time", "argument_pos": []}, {"argument": "fraudulent emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The fraud led university staff members to transfer $ 11.8 million to a bank account they believed belonged to the vendor , the university said .", "event": [{"event_trigger": "The fraud", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the vendor", "role": "trusted entity", "argument_pos": []}, {"argument": "university staff members", "role": "victim", "argument_pos": []}, {"argument": "transfer", "role": "purpose", "argument_pos": []}, {"argument": "$ 11.8 million", "role": "damage amount", "argument_pos": []}]}], "task": "EE"} {"text": "Cloquet school district has been hit by a ransomware attack second time in the past three years .", "event": [{"event_trigger": "has been hit by a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Cloquet school district", "role": "victim", "argument_pos": []}, {"argument": "the past three years", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The ransomware also encrypts the documents and then demands ransom for providing a key to unlock encrypted files .", "event": [{"event_trigger": "demands ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "encrypts the documents", "role": "attack pattern", "argument_pos": []}, {"argument": "The ransomware", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "However , the attack does not indicate stealing of any information .", "event": [{"event_trigger": "stealing", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Board members of Cloquet School were explained by Smith on 13 Aug , 2018 , that the district only was left with two options other than succumbing to the demands of ransom by the hacker - one , trying to recover data with a probability that the data may not be retrieved and then it would be a complete waste of money and time .", "event": [{"event_trigger": "the demands of ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "hacker", "role": "attacker", "argument_pos": []}, {"argument": "the district", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Besides , the board members suggested hiring a \" forensic \" company to investigate on the ransomware attack and determine the source from where the virus has entered .", "event": [{"event_trigger": "the ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the virus", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "The exploit , which has now been patched , affected customers banking with hundreds of financial institutions US - based financial services firm Fiserv has just fixed a flaw in its web platform that exposed the personal and financial details of a vast number of banking customers .", "event": [{"event_trigger": "has now been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "With more than 12,000 clients across the world using the company 's services , it is hard to establish how many customers ' details were exposed in the ' information disclosure vulnerability ' found by security researcher Kristian Erik Hermansen .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "security researcher Kristian Erik Hermansen", "role": "discoverer", "argument_pos": []}, {"argument": "the ' information disclosure vulnerability '", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "He added a criminal could have exploited the flaw to steal information from customers .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "a criminal", "role": "attacker", "argument_pos": []}, {"argument": "exploited the flaw", "role": "attack pattern", "argument_pos": []}, {"argument": "information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Together with KrebsOnSeceurity author Brian Krebs , Hermansen worked to verify whether or not the flaw was exclusive to his own bank 's installation of the platform .", "event": [{"event_trigger": "verify", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Hermansen", "role": "discoverer", "argument_pos": []}, {"argument": "Brian Krebs", "role": "discoverer", "argument_pos": []}, {"argument": "KrebsOnSeceurity", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "They soon discovered hundreds of other Fiserv - affiliated banks may have been just as vulnerable as those they had tested .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "They", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "A spokesperson told Krebs that Fiserv had responded accordingly , and corrected the issue .", "event": [{"event_trigger": "corrected", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "Fiserv", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "\" We developed a security patch within 24 hours of receiving notification and deployed the patch to clients that utilise a hosted version of the solution .", "event": [{"event_trigger": "developed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a security patch", "role": "patch", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}, {"argument": "24 hours", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "We will be deploying the patch this evening to clients that utilise an in - house version of the solution .", "event": [{"event_trigger": "will be deploying", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the patch", "role": "patch", "argument_pos": []}, {"argument": "this evening", "role": "time", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}, {"argument": "an in - house version", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "\" While information disclosure vulnerabilities are among the most common types of website security issues , according to Krebs , they are also the most preventable and easy to fix .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "information disclosure vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has quickly reacted to the disclosure of a previously unknown zero - day vulnerability in the Windows operating system .", "event": [{"event_trigger": "the disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "discoverer", "argument_pos": []}, {"argument": "a previously unknown zero - day vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the Windows operating system", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "On Monday , Twitter user SandboxEscaper revealed the existence of the bug on the microblogging platform .", "event": [{"event_trigger": "revealed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the microblogging platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "Twitter user SandboxEscaper", "role": "discoverer", "argument_pos": []}, {"argument": "Monday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Following the disclosure , on Tuesday , Will Dormann , vulnerability analyst at CERT / CC verified the bug , adding that the zero - day flaw works \" well in a fully - patched 64 - bit Windows 10 system . \"", "event": [{"event_trigger": "the disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Tuesday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The Windows vulnerability is described as a local privilege escalation security flaw in the Microsoft Windows task scheduler caused by errors in the handling of Advanced Local Procedure Call ( ALPC ) systems .", "event": [{"event_trigger": "is described as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The Windows vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "a local privilege escalation security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the Microsoft Windows task scheduler", "role": "vulnerable system", "argument_pos": []}, {"argument": "errors in the handling of Advanced Local Procedure Call ( ALPC ) systems", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "If exploited , the zero - day bug permits local users to obtain system privileges .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the zero - day bug", "role": "vulnerability", "argument_pos": []}, {"argument": "permits local users to obtain system privileges", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "As ALPC is a local system , the impact is limited , but the public disclosure of a zero - day is still likely a headache for the Redmond giant .", "event": [{"event_trigger": "the public disclosure", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a zero - day", "role": "vulnerability", "argument_pos": []}, {"argument": "ALPC", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Redmond giant", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "However , Microsoft has acknowledged the zero - day flaw .", "event": [{"event_trigger": "has acknowledged", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the zero - day flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "This is likely to take place on September 11 , the next scheduled Microsoft Patch Tuesday , unless the firm decides to issue an out - of - schedule patch .", "event": [{"event_trigger": "issue", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "an out - of - schedule patch", "role": "patch", "argument_pos": []}, {"argument": "the firm", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The bug was found in the core infrastructure of Apache Struts 2 .", "event": [{"event_trigger": "was found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the core infrastructure", "role": "vulnerable system", "argument_pos": []}, {"argument": "The bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Apache Struts 2", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The Apache Software Foundation has patched a critical security vulnerability which affects all versions of Apache Struts 2 .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apache Struts 2", "role": "vulnerable system", "argument_pos": []}, {"argument": "all versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "a critical security vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Uncovered by researchers from cybersecurity firm Semmle , the security flaw is caused by the insufficient validation of untrusted user data in the core Struts framework .", "event": [{"event_trigger": "Uncovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "cybersecurity firm Semmle", "role": "discoverer", "argument_pos": []}, {"argument": "the security flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the core Struts framework", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "As the bug , CVE -2018-11776 , has been discovered in the Struts core , the team says there are multiple attack vectors threat actors could use to exploit the vulnerability .", "event": [{"event_trigger": "has been discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-11776", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the Struts core", "role": "vulnerable system", "argument_pos": []}, {"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Man Yue Mo from the Semmle Security Research Team first reported the flaw .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the Semmle Security Research Team", "role": "discoverer", "argument_pos": []}, {"argument": "Man Yue Mo", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" This vulnerability affects commonly - used endpoints of Struts , which are likely to be exposed , opening up an attack vector to malicious hackers , \" Mo says .", "event": [{"event_trigger": "says", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mo", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "\" On top of that , the weakness is related to the Struts OGNL language , which hackers are very familiar with , and are known to have been exploited in the past . \"", "event": [{"event_trigger": "been exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "weakness", "role": "vulnerability", "argument_pos": []}, {"argument": "Struts OGNL language", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability affects all versions of Apache Struts 2 .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apache Struts 2", "role": "vulnerable system", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "all versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Users of Struts 2.3 are advised to upgrade to 2.3.35 ; users of Struts 2.5 need to upgrade to 2.5.17 .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "2.3.35", "role": "patch number", "argument_pos": []}, {"argument": "Struts", "role": "vulnerable system", "argument_pos": []}, {"argument": "2.3", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "As the latest releases only contain fixes for the vulnerability , Apache does not expect users to experience any backward compatibility issues .", "event": [{"event_trigger": "contain", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the latest releases", "role": "patch number", "argument_pos": []}]}], "task": "EE"} {"text": "\" Previous disclosures of similarly critical vulnerabilities have resulted in exploits being published within a day , putting critical infrastructure and customer data at risk , \" Semmle says .", "event": [{"event_trigger": "disclosures", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "similarly critical vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" All applications that use Struts are potentially vulnerable , even when no additional plugins have been enabled . \"", "event": [{"event_trigger": "vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Struts", "role": "vulnerable system", "argument_pos": []}, {"argument": "All applications", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Mo first reported the findings in April .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Mo", "role": "discoverer", "argument_pos": []}, {"argument": "April", "role": "time", "argument_pos": []}, {"argument": "the findings", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "By June , the Apache Struts team published the code which resolved the problem , leading to the release of official patches on August 22 .", "event": [{"event_trigger": "resolved", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the code", "role": "patch", "argument_pos": []}, {"argument": "the Apache Struts team", "role": "releaser", "argument_pos": []}, {"argument": "June", "role": "time", "argument_pos": []}, {"argument": "the problem", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The fraudsters are no longer relying on phishing emails about lotteries and charity as bait , but are duping people on the pretext of partnering with MNCs ( multinational companies ) , investing in herbal seed businesses and channelising foreign funds .", "event": [{"event_trigger": "are duping", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}, {"argument": "MNCs ( multinational companies )", "role": "trusted entity", "argument_pos": []}, {"argument": "phishing emails", "role": "tool", "argument_pos": []}, {"argument": "The fraudsters", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "A senior Delhi Police Crime Branch officer said : ' The scamsters lure gullible targets via social networking sites such as Facebook . '", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The scamsters", "role": "attacker", "argument_pos": []}, {"argument": "gullible targets", "role": "victim", "argument_pos": []}, {"argument": "Facebook", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "They then pose as diplomats or MNC executives and entice their targets to invest in a global venture , which actually does not exist .", "event": [{"event_trigger": "pose as", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "diplomats", "role": "trusted entity", "argument_pos": []}, {"argument": "MNC executives", "role": "trusted entity", "argument_pos": []}, {"argument": "They", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Police claim the gangs have developed a new trick , where they pose as diplomat or MNC executive and work in nexus with a local youth who helps them with logistics .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the gangs", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "A vulnerability affects all versions of the OpenSSH client released in the past two decades , ever since the application was released in 1999 .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the OpenSSH client", "role": "vulnerable system", "argument_pos": []}, {"argument": "the past two decades", "role": "time", "argument_pos": []}, {"argument": "all versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The security bug received a patch this week , but since the OpenSSH client is embedded in a multitude of software applications and hardware devices , it will take months , if not years , for the fix to trickle down to all affected systems .", "event": [{"event_trigger": "received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "This particular bug was analyzed last week by security researchers from Qualys who spotted a commit in OpenBSD 's OpenSSH source code for a bug report submitted by Darek Tytko from securitum.pl .", "event": [{"event_trigger": "was analyzed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "This particular bug", "role": "vulnerability", "argument_pos": []}, {"argument": "last week", "role": "time", "argument_pos": []}, {"argument": "security researchers", "role": "discoverer", "argument_pos": []}, {"argument": "Qualys", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "After analyzing the commit , researchers realized that the code inadvertently fixed a security bug lying dormant in the OpenSSH client since its creation .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "releaser", "argument_pos": []}, {"argument": "a security bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the OpenSSH client", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The bug — tracked as CVE -2018-15473 — has been patched in the stable version of OpenSSH — 1:6.7 p1 - 1 and 1:7.7 p1 - 1 — and the 1:7.7 p1 - 4 unstable branch .", "event": [{"event_trigger": "has been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "OpenSSH", "role": "vulnerable system", "argument_pos": []}, {"argument": "stable version", "role": "vulnerable system version", "argument_pos": []}, {"argument": "the 1:7.7 p1 - 4 unstable branch", "role": "vulnerable system version", "argument_pos": []}, {"argument": "1:6.7 p1 - 1", "role": "vulnerable system version", "argument_pos": []}, {"argument": "1:7.7 p1 - 1", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Patches have also trickled down to Debian , and most likely other Linux distros .", "event": [{"event_trigger": "trickled down", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Debian", "role": "vulnerable system", "argument_pos": []}, {"argument": "Linux distros", "role": "vulnerable system", "argument_pos": []}, {"argument": "Patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft releases Intel 's microcode updates , including one to address the recently revealed Foreshadow flaw .", "event": [{"event_trigger": "releases", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "microcode updates", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "Intel", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has released a set of new microcode patches from Intel that address Spectre vulnerabilities , as well as the recently disclosed Foreshadow attacks .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "a set of new microcode patches", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The updates are available for all supported versions of Windows 10 and Windows Server .", "event": [{"event_trigger": "are available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Windows 10", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows Server", "role": "vulnerable system", "argument_pos": []}, {"argument": "The updates", "role": "patch", "argument_pos": []}, {"argument": "all supported versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "As noted on the support page for Windows 10 version 1803 , the microcode updates include mitigations for Spectre Variant 3a , CVE -2018-3640 , Spectre Variant 4 , CVE -2018-3639 , as well as two of the Foreshadow bugs , CVE -2018-3615 and CVE -2018-3646 , which are also known as L1TF or ' L1 Terminal Fault ' .", "event": [{"event_trigger": "are also known as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "L1TF", "role": "vulnerability", "argument_pos": []}, {"argument": "L1 Terminal Fault", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "As Microsoft recently highlighted , Windows machines with affected Intel CPUs will need microcode as well as software patches to mitigate the Foreshadow attacks .", "event": [{"event_trigger": "mitigate", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "software patches", "role": "patch", "argument_pos": []}, {"argument": "Intel CPUs", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows machines", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Foreshadow attacks", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft began helping Intel deliver its microcode updates after Intel first started addressing the Meltdown and Spectre CPU flaws in January .", "event": [{"event_trigger": "deliver", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Intel", "role": "releaser", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "its microcode updates", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The microcode updates help mitigate Spectre Variant 2 , CVE -2017-5715 .", "event": [{"event_trigger": "mitigate", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "microcode updates", "role": "patch", "argument_pos": []}, {"argument": "Spectre Variant 2", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2017-5715", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Foreshadow includes CVE -2018-3615 , which affects Intel 's Software Guard Extensions ( SGX ) enclaves , while CVE -2018-3620 affects operating systems and System Management Mode ( SMM ) memory .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-3615", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Foreshadow", "role": "vulnerability", "argument_pos": []}, {"argument": "Software Guard Extensions ( SGX ) enclaves", "role": "vulnerable system", "argument_pos": []}, {"argument": "Intel", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-3646 impacts virtualization .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-3646", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "virtualization", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft made the updates , all dated 8/20/2018 , available on the Microsoft Update Catalog this week .", "event": [{"event_trigger": "made", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "the updates", "role": "patch", "argument_pos": []}, {"argument": "8/20/2018", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Another critical security hole has been found in Apache Struts 2 , requiring an immediate update .", "event": [{"event_trigger": "has been found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Apache Struts 2", "role": "vulnerable system", "argument_pos": []}, {"argument": "critical security hole", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability – CVE -2018-11776 – affects core code and allows miscreants to pull off remote code execution against vulnerable servers and websites .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "core code", "role": "vulnerable system", "argument_pos": []}, {"argument": "allows miscreants to pull off remote code execution", "role": "capabilities", "argument_pos": []}, {"argument": "CVE -2018-11776", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "It affects all versions of Struts 2 , the popular open - source framework for Java web apps .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Struts 2", "role": "vulnerable system", "argument_pos": []}, {"argument": "all versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The Apache Software Foundation has \" urgently advised \" anyone using Struts to update to the latest version immediately , noting that the last time a critical hole was found , the holes were being exploited in the wild just a day later .", "event": [{"event_trigger": "was found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical hole", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In other words , if you delay in patching , your organization will be compromised in short order via this bug , if you are running vulnerable systems .", "event": [{"event_trigger": "patching", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "this bug", "role": "vulnerability", "argument_pos": []}, {"argument": "vulnerable systems", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "It was that earlier flaw that led to a nightmare data breach from credit company Equifax after it failed to patch swiftly enough .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Equifax", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The details of nearly 150 million people were exposed , costing the company more than $ 600m , so this is not something to be taken lightly .", "event": [{"event_trigger": "were exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "150 million", "role": "number of victim", "argument_pos": []}, {"argument": "people", "role": "victim", "argument_pos": []}, {"argument": "The details", "role": "compromised data", "argument_pos": []}, {"argument": "$ 600m", "role": "damage amount", "argument_pos": []}, {"argument": "the company", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The company that discovered the vulnerability – Semmle Security Research Team – warns that this latest one is actually worse that the one last year , which it also found .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The company", "role": "discoverer", "argument_pos": []}, {"argument": "the vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Semmle Security Research Team", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Semmle found the hole back in April and reported it to Apache , which put out a patch in June that it has now pulled into formal updates ( 2.3.35 for those using version 2.3 and 2.5.17 for those on 2.5 ) .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Semmle", "role": "discoverer", "argument_pos": []}, {"argument": "the hole", "role": "vulnerability", "argument_pos": []}, {"argument": "April", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Semmle 's VP of engineering , Pavel Avgustinov , had this to say about the hole on Wednesday this week : \" Critical remote code execution vulnerabilities like the one that affected Equifax and the one we announced today are incredibly dangerous for several reasons : Struts is used for publicly - accessible customer - facing websites , vulnerable systems are easily identified , and the flaw is easy to exploit .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Critical remote code execution vulnerabilities", "role": "capabilities", "argument_pos": []}, {"argument": "Equifax", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "A hacker can find their way in within minutes , and exfiltrate data or stage further attacks from the compromised system .", "event": [{"event_trigger": "exfiltrate", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "hacker", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "\" This is very far from the first time that big security holes have been found in Struts , leading some to recommend that people simply stop using it .", "event": [{"event_trigger": "have been found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Struts", "role": "vulnerable system", "argument_pos": []}, {"argument": "big security holes", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The two vulnerabilities are critical remote code execution flaws that exist in Adobe Photoshop CC .", "event": [{"event_trigger": "exist in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The two vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Photoshop CC", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe hurried out unscheduled patches today for two critical flaws that could enable remote code - execution in Photoshop CC .", "event": [{"event_trigger": "hurried out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "unscheduled patches", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "two critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "enable remote code - execution in Photoshop CC", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "The patches impact two memory corruption vulnerabilities in Adobe Photoshop products , including Photoshop CC 2018 ( v 19.1.6 ) and Photoshop CC 2017 ( v 18.1.6 ) , both for Windows and macOS .", "event": [{"event_trigger": "impact", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The patches", "role": "patch", "argument_pos": []}, {"argument": "two memory corruption vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Photoshop products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Photoshop CC 2018", "role": "vulnerable system", "argument_pos": []}, {"argument": "Photoshop CC 2017", "role": "vulnerable system", "argument_pos": []}, {"argument": "v 19.1.6", "role": "vulnerable system version", "argument_pos": []}, {"argument": "v 18.1.6", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "The release comes only a week after the company fixed a slew of glitches last Patch Tuesday .", "event": [{"event_trigger": "comes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a week after", "role": "time", "argument_pos": []}, {"argument": "The release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "“ Adobe has released updates for Photoshop CC for Windows and macOS , ” the company said in a Wednesday security bulletin .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "Photoshop CC", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "“ These updates resolve critical vulnerabilities in Photoshop CC 19.1.5 and earlier 19.x versions , as well as 18.1.5 and earlier 18.x versions .", "event": [{"event_trigger": "resolve", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "These updates", "role": "patch", "argument_pos": []}, {"argument": "critical vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Photoshop CC", "role": "vulnerable system", "argument_pos": []}, {"argument": "19.1.5", "role": "vulnerable system version", "argument_pos": []}, {"argument": "earlier 19.x versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "18.1.5", "role": "vulnerable system version", "argument_pos": []}, {"argument": "earlier 18.x versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Kushal Arvind Shah of Fortinet ’s FortiGuard Labs was credited with reporting the two flaws .", "event": [{"event_trigger": "reporting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Kushal Arvind Shah", "role": "discoverer", "argument_pos": []}, {"argument": "the two flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Fortinet ’s FortiGuard Labs", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe said impacted users need to apply the fixes to the affected versions of Photoshop by updating to version 19.1.6 ( via the applications ’ update mechanism ) .", "event": [{"event_trigger": "need to apply", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the fixes", "role": "patch", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "Photoshop", "role": "vulnerable system", "argument_pos": []}, {"argument": "updating", "role": "patch", "argument_pos": []}, {"argument": "versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "version 19.1.6", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Last week , Adobe released 11 total fixes for an array of products , including two critical patches for Acrobat and Reader for Windows and macOS .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Last week", "role": "time", "argument_pos": []}, {"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "an array of products", "role": "vulnerable system", "argument_pos": []}, {"argument": "two critical patches", "role": "patch", "argument_pos": []}, {"argument": "Acrobat", "role": "vulnerable system", "argument_pos": []}, {"argument": "Reader", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows", "role": "supported platform", "argument_pos": []}, {"argument": "macOS", "role": "supported platform", "argument_pos": []}]}], "task": "EE"} {"text": "Airmail has issued an update today to patch a vulnerability that security researchers said could let malicious third parties access email databases and read a user ’s messages .", "event": [{"event_trigger": "has issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Airmail", "role": "releaser", "argument_pos": []}, {"argument": "an update", "role": "patch", "argument_pos": []}, {"argument": "today", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Security consulting firm Versprite outlined the issue in a blog post this morning , noting how Airmail 3 uses both a custom URL scheme and a so - called “ deterministic ” file system location for email messages for any given account .", "event": [{"event_trigger": "outlined", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Security consulting firm Versprite", "role": "discoverer", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "this morning", "role": "time", "argument_pos": []}, {"argument": "Airmail 3", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Using those two pieces of information , a hacker could theoretically retrieve every one of a user ’s messages through a phishing scheme that relies on that custom URL scheme .", "event": [{"event_trigger": "phishing scheme", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Airmail told The Verge that it ’s already updated the app in the Mac App store and through its direct download beta program to address the issue , calling it a “ very hypothetical ” one .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "beta program", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The version number is Airmail 3.6 , and it should be rolling out over the course of the day if you do n’t already have it now .", "event": [{"event_trigger": "be rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "3.6", "role": "patch number", "argument_pos": []}, {"argument": "Airmail", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Tavis Ormandy , a Google Project Zero security researcher , has revealed details about a new major vulnerability discovered in Ghostscript , an interpreter for Adobe 's PostScript and PDF page description languages .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Ghostscript", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Exploiting the bug Ormandy discovered requires that an attacker sends a malformed PostScript , PDF , EPS , or XPS file to a victim .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Ormandy", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability , which has not received a CVE identifier just yet , allows an attacker to take over applications and servers that use vulnerable versions of Ghostscript .", "event": [{"event_trigger": "received a CVE", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "take over applications and servers", "role": "capabilities", "argument_pos": []}, {"argument": "vulnerable versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "Ghostscript", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "At the time of writing , there is no fix available .", "event": [{"event_trigger": "available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fix", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "He discovered similar high severity issues affecting Ghostscript in 2016 and again in 2017 .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Ghostscript", "role": "vulnerable system", "argument_pos": []}, {"argument": "2016", "role": "time", "argument_pos": []}, {"argument": "2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability he found in 2017 — CVE -2017-8291 — was adopted by North Korean hackers , who used it to break into South Korean cryptocurrency exchanges , steal funds , and later plant false flags in an attempt to pin the hacks on Chinese - speaking threat actors .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "he", "role": "discoverer", "argument_pos": []}, {"argument": "2017", "role": "time", "argument_pos": []}, {"argument": "CVE -2017-8291", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "break into South Korean cryptocurrency exchanges", "role": "capabilities", "argument_pos": []}, {"argument": "steal funds", "role": "capabilities", "argument_pos": []}, {"argument": "pin the hacks on Chinese - speaking threat actors", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "A Vermont business 's computer system was attacked by hackers and held for ransom .", "event": [{"event_trigger": "was attacked", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "computer system", "role": "victim", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "A Vermont business", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "It may sound like a movie plot but ransomware attacks like these are on the rise .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "An example of a ransomware attack is software that downloads to your computer , encrypts your data and then demands money to get it back .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "your computer", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The company 's sales information from the last 5 - 10 years was stolen , including customers ' names , addresses , phone numbers and email addresses .", "event": [{"event_trigger": "was stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "sales information", "role": "compromised data", "argument_pos": []}, {"argument": "email addresses", "role": "compromised data", "argument_pos": []}, {"argument": "phone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "addresses", "role": "compromised data", "argument_pos": []}, {"argument": "names", "role": "compromised data", "argument_pos": []}, {"argument": "company", "role": "victim", "argument_pos": []}, {"argument": "customers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "A McAfee report shows that ransomware attacks are up more than 100 percent in the second quarter of 2018 over that same time frame in 2016 .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Attacks with this ransomware strain were first spotted last Monday , August 13 , according to independent security researcher MalwareHunter , who first tweeted about this new threat .", "event": [{"event_trigger": "Attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "this ransomware strain", "role": "tool", "argument_pos": []}, {"argument": "last Monday , August 13", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Check Point says it found several Ryuk samples where the ransomware dropped different ransom notes on users ' systems .", "event": [{"event_trigger": "dropped", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the ransomware", "role": "tool", "argument_pos": []}, {"argument": "ransom notes", "role": "tool", "argument_pos": []}, {"argument": "systems", "role": "victim", "argument_pos": []}, {"argument": "users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers found a long , more verbose ransom note , and another , blunter and to - the - point ransom demand .", "event": [{"event_trigger": "ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransom note", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Both ransom notes asked victims to contact the Ryuk authors via email .", "event": [{"event_trigger": "asked", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransom notes", "role": "tool", "argument_pos": []}, {"argument": "the Ryuk authors", "role": "attacker", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Coincidentally or not , the ransom fees demanded via the longer and more detailed ransom note were higher ( 50 Bitcoin ~ $ 320,000 ) , compared to the shorter ransom note , where crooks asked for a smaller amount of money ( 15 - 35 Bitcoin , ~ $ 224,000 ) .", "event": [{"event_trigger": "the ransom fees demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransom note", "role": "tool", "argument_pos": []}, {"argument": "50 Bitcoin", "role": "price", "argument_pos": []}, {"argument": "$ 320,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "\" This could imply there may be two levels of offensive , \" Check Point said , suggesting that the Ryuk gang may also deploy different Ryuk samples based on the organization they manage to infect , and their ability to pay higher ransom fees .", "event": [{"event_trigger": "pay higher ransom fees", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "manage to infect", "role": "attack pattern", "argument_pos": []}, {"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "deploy different Ryuk samples", "role": "attack pattern", "argument_pos": []}, {"argument": "the Ryuk gang", "role": "attacker", "argument_pos": []}, {"argument": "the organization", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The BBC recently uncovered that scammers are attempting to trick us through the abuse of multilingual character sets .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "us", "role": "victim", "argument_pos": []}, {"argument": "through the abuse of multilingual character sets", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "By creating these lookalike sites with domain names that are almost identical to the URLs we know and trust , it ’s made telling the difference between fake and genuine sites – and avoiding phishing scams – increasingly difficult .", "event": [{"event_trigger": "creating", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the URLs", "role": "trusted entity", "argument_pos": []}, {"argument": "lookalike sites", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Research by security company Wandera revealed that people are three times more likely to fall for a phishing scam if it is on their phone .", "event": [{"event_trigger": "a phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "As a result , this new scam targets smartphone users , where the lookalike sites are harder to spot .", "event": [{"event_trigger": "this new scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the lookalike sites", "role": "tool", "argument_pos": []}, {"argument": "smartphone users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "For phishing scams specifically , it ’s one in ten of us .", "event": [{"event_trigger": "phishing scams", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "“ It is very easy to clone a real website and does not take a skilled developer long to produce a very professional - looking but malicious site , but if you know what to look for , it ’s easy to stay safe . ”", "event": [{"event_trigger": "clone", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "a real website", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "There are numerous ways to determine whether or not a received email is from a legitimate company trying to help , or a scammer looking to steal financial details .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "a scammer", "role": "attacker", "argument_pos": []}, {"argument": "financial details", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "This is a big indicator that it ’s a phishing scam .", "event": [{"event_trigger": "a phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "One of two Nigerians who admitted to being part of a conspiracy to steal personal information from Vermont state employees and other U.S. residents was sentenced .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Nigerians", "role": "attacker", "argument_pos": []}, {"argument": "personal information", "role": "compromised data", "argument_pos": []}, {"argument": "Vermont state employees", "role": "victim", "argument_pos": []}, {"argument": "U.S. residents", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "According to court records , the goal of the conspiracy was “ fooling United States residents … into sending the logon information they used to access their IRS form W - 2 data from their employer 's website to another website designed to look like their employer 's human resources page but actually operated by the conspiracy to collect this data ” .", "event": [{"event_trigger": "fooling", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "United States residents", "role": "victim", "argument_pos": []}, {"argument": "sending the logon information", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Once people entered their information into the fake website , the conspirators attempted to trick the IRS into sending tax refunds to the conspirators , but prosecutors said fraud detection controls put in place by the IRS “ caused most , if not all , such fraudulent tax returns to be rejected ” .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the conspirators", "role": "attacker", "argument_pos": []}, {"argument": "the IRS", "role": "victim", "argument_pos": []}, {"argument": "sending tax refunds", "role": "purpose", "argument_pos": []}, {"argument": "the conspirators", "role": "attacker", "argument_pos": []}, {"argument": "people", "role": "attacker", "argument_pos": []}, {"argument": "entered their information into the fake website", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft rolled out 60 patches for its Patch Tuesday release , impacting 19 critical flaws and 39 important flaws .", "event": [{"event_trigger": "rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "39 important flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "19 critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "release", "role": "patch", "argument_pos": []}, {"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Microsoft", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft has rolled out its August Patch Tuesday fixes , addressing 19 critical vulnerabilities , including fixes for two zero - day vulnerabilities that are under active attack .", "event": [{"event_trigger": "has rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Overall , the company patched a total of 60 flaws , spanning Microsoft Windows , Edge , Internet Explorer ( IE ) , Office , .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "60 flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Microsoft Windows", "role": "vulnerable system", "argument_pos": []}, {"argument": "Edge", "role": "vulnerable system", "argument_pos": []}, {"argument": "Internet Explorer ( IE )", "role": "vulnerable system", "argument_pos": []}, {"argument": "Office", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The patch release includes two exploited flaws , CVE -2018-8373 and CVE -2018-8414 , which were previously disclosed by researchers .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "two exploited flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-8373", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "CVE -2018-8414", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability exists in IE 9 , 10 and 11 , impacting all Windows operating systems from Server 2008 to Windows 10 .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "IE 9", "role": "vulnerable system", "argument_pos": []}, {"argument": "10", "role": "vulnerable system version", "argument_pos": []}, {"argument": "11", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Meanwhile , CVE -2018-8414 also enables RCE with the privileges of the logged - in user , and exists on Windows 10 versions 1703 and newer , as well as Server 1709 and Server 1803 .", "event": [{"event_trigger": "exists on", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "enables RCE with the privileges of the logged - in user", "role": "capabilities", "argument_pos": []}, {"argument": "CVE -2018-8414", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Windows 10", "role": "vulnerable system", "argument_pos": []}, {"argument": "Server 1709", "role": "vulnerable system", "argument_pos": []}, {"argument": "Server 1803", "role": "vulnerable system", "argument_pos": []}, {"argument": "versions 1703 and newer", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "“ The two zero - day vulnerabilities are … publicly disclosed and exploited , ” said Chris Goettl , director of product management , security , for Ivanti , in an email .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The two zero - day vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "“ CVE -2018-8373 is a vulnerability that exists in the way that the scripting engine handles objects in memory in Internet Explorer .", "event": [{"event_trigger": "exists in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-8373", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Internet Explorer", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "CVE -2018-8414 code - execution vulnerability exists when the Windows Shell does not properly validate file paths . ”", "event": [{"event_trigger": "exists", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Windows Shell", "role": "vulnerable system", "argument_pos": []}, {"argument": "code - execution vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-8414", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "Microsoft also issued fixes for security issues that do n’t impact Windows , but the company thought they were important enough to package into its OS updates , dubbed advisories .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "security issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The model irked customers so much that enterprise patching veteran Susan Bradley wrote an open letter to Microsoft executives expressing the “ dissatisfaction your customers have with the updates released for Windows desktops and servers in recent months . ”", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the updates", "role": "patch", "argument_pos": []}, {"argument": "Windows desktops", "role": "vulnerable system", "argument_pos": []}, {"argument": "servers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle is advising customers to update their database software following the discovery and disclosure of a critical remote code execution vulnerability .", "event": [{"event_trigger": "the discovery", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The flaw , dubbed CVE -2018-3110 was given a CVSS base score of 9.9 ( out of 10 ) and Oracle warns that successful exploit of the bug \" can result in complete compromise of the Oracle Database and shell access to the underlying server . \"", "event": [{"event_trigger": "warns", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-3110", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Oracle", "role": "discoverer", "argument_pos": []}, {"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the Oracle Database", "role": "vulnerable system", "argument_pos": []}, {"argument": "the underlying server", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw itself is found in the JavaVM component of Oracle Database Server and is not considered a remote code exploit flaw , as it requires the attacker have a connection to the server via Oracle Net , the protocol Oracle servers use to connect with client applications .", "event": [{"event_trigger": "is found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Oracle Database Server", "role": "vulnerable system", "argument_pos": []}, {"argument": "a remote code exploit flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the JavaVM component", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "In addition to this fix , Microsoft is releasing its monthly Patch Tuesday security update for Windows , Office , and Internet Explorer / Edge today , and Adobe has posted fixes for security holes in Flash Player , Acrobat / Reader , Creative Cloud , and Experience manager .", "event": [{"event_trigger": "this fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Nearly three weeks after many of its systems were knocked out by a complex ransomware virus , Alaska ’s Matanuska - Susitna Borough has restored most of its phone system , part of its geospatial information system and the online portal on which residents can pay their looming property - tax bills .", "event": [{"event_trigger": "were knocked out", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "its systems", "role": "victim", "argument_pos": []}, {"argument": "a complex ransomware virus", "role": "tool", "argument_pos": []}, {"argument": "Nearly three weeks", "role": "time", "argument_pos": []}, {"argument": "Alaska", "role": "place", "argument_pos": []}, {"argument": "Matanuska - Susitna Borough", "role": "victim", "argument_pos": []}, {"argument": "phone system", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "But other systems are still being rebuilt after the borough ’s encounter with the ransomware known as BitPaymer , which locked down systems ranging from main file servers to the card - swipe mechanisms that control doors in government buildings .", "event": [{"event_trigger": "encounter", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the card - swipe mechanisms", "role": "victim", "argument_pos": []}, {"argument": "main file servers", "role": "victim", "argument_pos": []}, {"argument": "locked down systems", "role": "attack pattern", "argument_pos": []}, {"argument": "BitPaymer", "role": "tool", "argument_pos": []}, {"argument": "the ransomware", "role": "tool", "argument_pos": []}, {"argument": "the borough", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "BitPaymer is a complex cocktail of malware that enters a targeted system through a Trojan horse , then lies dormant until it ’s noticed and authorized users attempt to remove it , at which point it locks up the system with a demand for a sum of money payable in bitcoin .", "event": [{"event_trigger": "a demand for a sum of money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "locks up the system", "role": "attack pattern", "argument_pos": []}, {"argument": "payable in bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "BitPaymer", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "In the case of Mat - Su , as the borough is known to residents , Wyatt has said the Trojan component likely arrived as early as May 3 , more than two months before an attempted anti-virus sweep triggered the ransom demand .", "event": [{"event_trigger": "the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "PGA of America computers were infected this week with a strain of malicious software that locked down critical files and demanded cryptocurrency for their return .", "event": [{"event_trigger": "demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "locked down critical files", "role": "attack pattern", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}, {"argument": "malicious software", "role": "tool", "argument_pos": []}, {"argument": "this week", "role": "time", "argument_pos": []}, {"argument": "PGA", "role": "victim", "argument_pos": []}, {"argument": "America", "role": "place", "argument_pos": []}]}], "task": "EE"} {"text": "Officials discovered on Tuesday that servers had been targeted in a ransomware attack that blocked them from obtaining access to material relating to major golf tournaments , including this week ’s PGA Championship at Bellerive Country Club .", "event": [{"event_trigger": "ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "blocked them from obtaining access to material", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The extortion threat was clear : Transfer bitcoin to the hackers or lose the files forever .", "event": [{"event_trigger": "The extortion threat", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the hackers", "role": "attacker", "argument_pos": []}, {"argument": "Transfer bitcoin", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "A source who asked not to be named told Golfweek that officials had no intention of paying the ransom demand — following the advice of most law enforcement officials and cybersecurity experts .", "event": [{"event_trigger": "paying the ransom demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "officials", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Researcher Lawrence Abrams said one previous extortion scheme asked for 53 bitcoins , equivalent to $ 335,000 .", "event": [{"event_trigger": "asked for", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "53 bitcoins", "role": "price", "argument_pos": []}, {"argument": "$ 335,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "Abrams described BitPaymer as a “ secure ransomware ” and said the PGA would either have to rely on backups to regain access to its files or pay the significant bitcoin demand .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the PGA", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "IBM has discovered 17 zero - day vulnerabilities in smart city systems which could debilitate core services .", "event": [{"event_trigger": "has discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "17 zero - day vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "smart city systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "IBM", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Together with researchers from Threatcare , IBM X-Force Red discovered that smart city systems developed by Libelium , Echelon and Battelle were vulnerable to attack .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "IBM X-Force Red", "role": "discoverer", "argument_pos": []}, {"argument": "smart city systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "Libelium", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Echelon", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "Battelle", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "According to IBM X-Force Red researcher Daniel Crowley , out of the 17 previously - unknown vulnerabilities discovered in systems used in four smart cities , eight are deemed critical in severity .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the 17 previously - unknown vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "IBM X-Force Red researcher Daniel Crowley", "role": "discoverer", "argument_pos": []}, {"argument": "systems", "role": "vulnerable system", "argument_pos": []}, {"argument": "four smart cities", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "In total , the researchers uncovered four instances of critical pre-authentication shell injection flaws in Libelium 's wireless sensor network , Meshlium .", "event": [{"event_trigger": "uncovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the researchers", "role": "discoverer", "argument_pos": []}, {"argument": "critical pre-authentication shell injection flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "wireless sensor network", "role": "vulnerable system", "argument_pos": []}, {"argument": "Libelium", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "With a man - in - the - middle attack , fraudsters will try to “ listen in ” on this network traffic , perhaps by accessing the same public Wi - Fi network as the mobile user , and attempt to send a fake bank server certificate to the mobile app .", "event": [{"event_trigger": "send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the mobile app", "role": "trusted entity", "argument_pos": []}, {"argument": "a fake bank server certificate", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "It occurs when a fraudster pretends to be a legitimate financial institution that asks a mobile user to submit private bank information .", "event": [{"event_trigger": "pretends to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "a legitimate financial institution", "role": "attacker", "argument_pos": []}, {"argument": "a fraudster", "role": "attacker", "argument_pos": []}, {"argument": "submit private bank information", "role": "purpose", "argument_pos": []}, {"argument": "a mobile user", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Many phishing attempts bypass mobile apps completely .", "event": [{"event_trigger": "phishing attempts", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "bypass mobile apps completely", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "A hacker could send emails telling people their account is locked and asking them to reply to the message with their account username and password .", "event": [{"event_trigger": "could send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "A hacker", "role": "attacker", "argument_pos": []}, {"argument": "emails", "role": "tool", "argument_pos": []}, {"argument": "telling people their account is locked", "role": "attack pattern", "argument_pos": []}, {"argument": "asking them to reply to the message", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Over a hundred HP Inkjet printers have serious flaws that should be fixed , HP has warned .", "event": [{"event_trigger": "has warned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "HP", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Computer and printer giant HP has flagged two critical flaws over a hundred different printer models that it says should be patched “ as soon as possible ” .", "event": [{"event_trigger": "has flagged", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "HP", "role": "discoverer", "argument_pos": []}, {"argument": "two critical flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "printer models", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The bugs , which have been assigned the numbers CVE -2018-5924 and CVE -2018-5925 , are rated “ critical ” and could allow remote code execution .", "event": [{"event_trigger": "have been assigned", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-5924", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-5925", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "could allow remote code execution", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "“ Two security vulnerabilities have been identified with certain HP Inkjet printers .", "event": [{"event_trigger": "have been identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Two security vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "HP Inkjet printers", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The company has n’t indicated whether the flaws are publicly known or under attack but says it was “ recently made aware of a vulnerability in certain inkjet printers by a third - party researcher . ”", "event": [{"event_trigger": "has n’t indicated", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The company", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "The patches come just a few days after HP Inc announced it would soon launch its printer bug bounty , which is the world ’s first and only print security bug bounty program .", "event": [{"event_trigger": "announced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "HP Inc", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "iOS 12.0.1 , Apple 's first update after the release of iOS 12 , has patched two vulnerabilities that could have allowed a user to bypass a device 's passcode .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "allowed a user to bypass a device 's passcode", "role": "issues addressed", "argument_pos": []}, {"argument": "two vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "12.0.1", "role": "patch number", "argument_pos": []}, {"argument": "update", "role": "patch", "argument_pos": []}, {"argument": "the release", "role": "patch", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "iOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "iOS 12", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Apple also says it has fixed a bug that caused the new iPhones to stop charging when their screens turned off .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "stop charging when their screens turned off", "role": "issues addressed", "argument_pos": []}, {"argument": "a bug", "role": "vulnerability", "argument_pos": []}, {"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "Apple", "role": "releaser", "argument_pos": []}, {"argument": "new iPhones", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The company has fixed a number of smaller bugs as well .", "event": [{"event_trigger": "has fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a number of smaller bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "The company", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "The update should be available to all users now .", "event": [{"event_trigger": "be available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The update", "role": "patch", "argument_pos": []}, {"argument": "now", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "If you do n't have automatic updates enabled , we recommend you update to the new patch ASAP if you 've experienced any of these flaws , or are worried about hackers obtaining your phone .", "event": [{"event_trigger": "update", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the new patch", "role": "patch", "argument_pos": []}, {"argument": "these flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Officials at a medical practice in Blue Springs say they are taking steps to strengthen privacy protections after a ransomware attack affected nearly 45,000 patients .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "patients", "role": "victim", "argument_pos": []}, {"argument": "medical practice", "role": "victim", "argument_pos": []}, {"argument": "Officials", "role": "victim", "argument_pos": []}, {"argument": "Blue Springs", "role": "place", "argument_pos": []}]}], "task": "EE"} {"text": "Blue Springs Family Care discovered in May that hackers had installed malware and ransomware encryption programs on its computer system , giving them full access to patient records .", "event": [{"event_trigger": "access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "patient records", "role": "compromised data", "argument_pos": []}, {"argument": "its computer system", "role": "victim", "argument_pos": []}, {"argument": "had installed malware and ransomware encryption programs", "role": "attack pattern", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "May", "role": "time", "argument_pos": []}, {"argument": "Blue Springs Family Care", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The attackers typically demand a ransom , often in Bitcoin or other cryptocurrencies , as a condition of unlocking the computer and allowing access to the system .", "event": [{"event_trigger": "demand a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The attackers", "role": "attacker", "argument_pos": []}, {"argument": "Bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "computer", "role": "victim", "argument_pos": []}, {"argument": "system", "role": "victim", "argument_pos": []}, {"argument": "other cryptocurrencies", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "Melanie Peterson , Blue Springs Family Care ’s privacy officer , says the medical practice did not pay a ransom .", "event": [{"event_trigger": "pay a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the medical practice", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Blue Springs Family Care ’s computer vendor discovered the ransomware attack on May 12 .", "event": [{"event_trigger": "the ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "May 12", "role": "time", "argument_pos": []}, {"argument": "Blue Springs Family Care", "role": "victim", "argument_pos": []}, {"argument": "computer vendor", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Health care businesses in particular have been targeted by ransomware attacks .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Health care businesses", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "According to Beazly , a cybersecurity insurance company , 45 percent of ransomware attacks in 2017 targeted the health care industry .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "2017", "role": "time", "argument_pos": []}, {"argument": "the health care industry", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Financial services , which accounted for 12 percent of ransomware attacks , were a distant second .", "event": [{"event_trigger": "ransomware attacks", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Financial services", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Last month , Cass Regional Medical Center in Harrisonville , Missouri , reported a ransomware attack had briefly cut off access to its electronic health record system on July 9 .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "July 9", "role": "time", "argument_pos": []}, {"argument": "cut off access to its electronic health record system", "role": "attack pattern", "argument_pos": []}, {"argument": "Harrisonville , Missouri", "role": "place", "argument_pos": []}, {"argument": "Cass Regional Medical Center", "role": "victim", "argument_pos": []}, {"argument": "Last month", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Hospital officials said there was no indication patient data was accessed .", "event": [{"event_trigger": "was accessed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "patient data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "A response to a phishing email has resulted in the PHI of 2,789 Kaleida Health patients being made accessible to cybercriminals .", "event": [{"event_trigger": "being made accessible", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the PHI", "role": "compromised data", "argument_pos": []}, {"argument": "cybercriminals", "role": "attacker", "argument_pos": []}, {"argument": "Kaleida Health patients", "role": "victim", "argument_pos": []}, {"argument": "2,789", "role": "number of victim", "argument_pos": []}, {"argument": "a phishing email", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "An analysis of its systems showed that by responding to the phishing email , the employee had provided access to his / her email account .", "event": [{"event_trigger": "provided access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the employee", "role": "victim", "argument_pos": []}, {"argument": "the phishing email", "role": "tool", "argument_pos": []}, {"argument": "email account", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "While access to Kaleida Health ’s EHR was not gained , the email account contained a range of protected health information of a small subset of its patients .", "event": [{"event_trigger": "access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Kaleida Health", "role": "victim", "argument_pos": []}, {"argument": "the email account", "role": "compromised data", "argument_pos": []}, {"argument": "protected health information", "role": "compromised data", "argument_pos": []}, {"argument": "patients", "role": "victim", "argument_pos": []}, {"argument": "EHR", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "However , no financial information or Social Security numbers were exposed at any time .", "event": [{"event_trigger": "were exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "Social Security numbers", "role": "compromised data", "argument_pos": []}, {"argument": "financial information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "While access to the email account was possible , no evidence was uncovered to suggest that the emails were accessed or any protected health information was viewed or copied .", "event": [{"event_trigger": "access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the email account", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "Phishing has grown to be one of the most serious threats to healthcare organizations .", "event": [{"event_trigger": "Phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "healthcare organizations", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "As we have already seen this year , record numbers of successful W - 2 phishing attacks have been reported and many healthcare employees have fallen for these phishing scams .", "event": [{"event_trigger": "these phishing scams", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "healthcare employees", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Files that were scrambled in a ransomware attack on Hāwera High School in Taranaki included school assessments that students had only partly completed as well as backups , principal Rachel Williams has confirmed .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Taranaki", "role": "place", "argument_pos": []}, {"argument": "school assessments", "role": "victim", "argument_pos": []}, {"argument": "Hāwera High School", "role": "victim", "argument_pos": []}, {"argument": "Files that were scrambled", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "More help is on the way for schools battling ransomware and other malware , but it has come a little late for the school which is being held to ransom for US$ 5000 by hackers .", "event": [{"event_trigger": "being held to ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "US$ 5000", "role": "price", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "the school", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The 2450 schools and 800,000 students on the network will get a new security solution supplied by Californian company Fortinet which would provide \" more robust protection against online threats , such as phishing and ransomware \" , it said in a statement issued on Monday .", "event": [{"event_trigger": "phishing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Ironically , that was the same day that staff at Hāwera High School switched on their computers to discover the message demanding US$ 5000 ( NZ$ 7352 ) in bitcoin for the return of encrypted data on a server containing students ' work and teaching resources .", "event": [{"event_trigger": "demanding", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Hāwera High School", "role": "victim", "argument_pos": []}, {"argument": "staff", "role": "victim", "argument_pos": []}, {"argument": "US$ 5000", "role": "price", "argument_pos": []}, {"argument": "NZ$ 7352", "role": "price", "argument_pos": []}, {"argument": "in bitcoin", "role": "payment method", "argument_pos": []}, {"argument": "a server", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Williams said many of its students and teachers had backed up their files in the cloud and were not affected by the ransomware attack , but backups stored on servers at the school were also encrypted by the hackers .", "event": [{"event_trigger": "the ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "servers", "role": "victim", "argument_pos": []}, {"argument": "the school", "role": "victim", "argument_pos": []}, {"argument": "the hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The Government is not believed to have any rules on whether state - funded organisations such as schools can pay ransoms , but in 2017 it issued advice against it and Williams said the school would follow police advice not to pay .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the school", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Utilizing old - fashioned social engineering , inventive hackers could forge transaction data and use it to trick support staff into crediting their account manually with extra XMR .", "event": [{"event_trigger": "could forge", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "hackers", "role": "attacker", "argument_pos": []}, {"argument": "transaction data", "role": "tool", "argument_pos": []}, {"argument": "Utilizing old - fashioned social engineering", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The good thing is that the flaw has since been patched ( in Monero at least , it is not entirely clear if this is the case for other Monero - based coins ) .", "event": [{"event_trigger": "has since been patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Monero", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The more concerning part is that it is only one out of six vulnerabilities disclosed by Monero in the last 24 hours alone , according to information from its HackerOne bug bounty program .", "event": [{"event_trigger": "disclosed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "one out of six vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Monero", "role": "discoverer", "argument_pos": []}, {"argument": "the last 24 hours", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Just like the wallet flaw , all of these vulnerabilities have already been fixed .", "event": [{"event_trigger": "have already been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "these vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This is not the first time researchers have found kinks in the anonymous cryptocurrency ’s code – but to Monero ’s credit , its dev team has always made sure to address such concerns appropriately .", "event": [{"event_trigger": "have found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the anonymous cryptocurrency ’s code", "role": "vulnerability", "argument_pos": []}, {"argument": "researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Update August 3 , 09:15 AM UTC : Monero project lead Riccardo Spagni , better known under the pseudonym ‘ fluffypony , ’ has since addressed the vulnerability disclosures in an email to Hard Fork .", "event": [{"event_trigger": "disclosures", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Hard Fork", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Spagni highlighted that although the bugs were made public yesterday , they were discovered – separately – over the span of several months .", "event": [{"event_trigger": "highlighted", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Spagni", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "“ The [ wallet ] vulnerability was introduced by the sub-address functionality , so it ’s relatively new , ” Spagni told Hard Fork .", "event": [{"event_trigger": "was introduced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The [ wallet ] vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Spagni", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "An anonymous computer hacker has demanded US$ 5000 from a provincial high school to return course work they are holding for ransom .", "event": [{"event_trigger": "has demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "US$ 5000", "role": "price", "argument_pos": []}, {"argument": "computer hacker", "role": "attacker", "argument_pos": []}, {"argument": "a provincial high school", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Hāwera High School staff in South Taranaki switched on their computers on Monday to discover a message demanding payment for the return of encrypted data on a server containing students ' work and teaching resources , principal Rachel Williams said .", "event": [{"event_trigger": "demanding payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "a server", "role": "victim", "argument_pos": []}, {"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "their computers", "role": "victim", "argument_pos": []}, {"argument": "South Taranaki", "role": "place", "argument_pos": []}, {"argument": "Hāwera High School staff", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The hack did not affect student and staff records but the entire school network was taken offline as a precaution .", "event": [{"event_trigger": "hack", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "student and staff records", "role": "compromised data", "argument_pos": []}, {"argument": "school network", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Conmen are taking phishing scams to the next level , targeting Apple users with emails and calls to a fake Apple Care service .", "event": [{"event_trigger": "phishing scams", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Conmen", "role": "attacker", "argument_pos": []}, {"argument": "Apple users", "role": "victim", "argument_pos": []}, {"argument": "calls to a fake Apple Care service", "role": "attack pattern", "argument_pos": []}, {"argument": "emails", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "While emails are a fairly common way of luring victims , it ’s not every day that you hear about calls being involved to dupe folks .", "event": [{"event_trigger": "luring", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "emails", "role": "tool", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Ars Technica reports that the attack begins with an email which is designed to look like an official iCloud account warning .", "event": [{"event_trigger": "attack", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "The webpage immediately redirects the victim to another site , followed by another redirection to a fake Apple Support page asking them to contact support since their iPhone has been locked due to illegal activity .", "event": [{"event_trigger": "redirects", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the victim", "role": "victim", "argument_pos": []}, {"argument": "a fake Apple Support page", "role": "tool", "argument_pos": []}, {"argument": "asking them to contact support", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "If they fall for the bait , the site launches a “ scanning ” box which eventually gives way to a pop - up box prompting the victim to call a number .", "event": [{"event_trigger": "fall for the bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "they", "role": "victim", "argument_pos": []}, {"argument": "the victim", "role": "victim", "argument_pos": []}, {"argument": "the site launches a “ scanning ” box", "role": "attack pattern", "argument_pos": []}, {"argument": "gives way to a pop - up box prompting", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The end game is to trick iPhone users into enrolling in a rogue mobile device management service .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "iPhone users", "role": "victim", "argument_pos": []}, {"argument": "enrolling in a rogue mobile device management service", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "This allows the attackers to push infected apps onto the victim ’s device , all the while pretending this is a part of Apple ’s security service .", "event": [{"event_trigger": "pretending", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Apple", "role": "trusted entity", "argument_pos": []}, {"argument": "the attackers", "role": "attacker", "argument_pos": []}, {"argument": "push infected apps onto the victim ’s device", "role": "purpose", "argument_pos": []}, {"argument": "security service", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "A day after a Navi Mumbai hospital and hotel became targets of a ransomware attack , cyber fraudsters encrypted data belonging to a Dadar - based chartered accountant and demanded money to remove the block on the data on Monday .", "event": [{"event_trigger": "demanded money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "cyber fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "Dadar - based chartered accountant", "role": "victim", "argument_pos": []}, {"argument": "encrypted data", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "While the incident took place on Monday , the complainant , realised that his data has been blocked on Tuesday .", "event": [{"event_trigger": "the incident", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "data has been blocked", "role": "attack pattern", "argument_pos": []}, {"argument": "the complainant", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Police said the incident took place on Monday at the complainant ’s office near Framroz court in Dadar .", "event": [{"event_trigger": "the incident", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "the complainant ’s office", "role": "victim", "argument_pos": []}, {"argument": "Dadar", "role": "place", "argument_pos": []}]}], "task": "EE"} {"text": "Around 2.15 pm , a message flashed on the complainant ’s computer screen saying , “ You have to pay for decryption in bitcoins .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "You", "role": "victim", "argument_pos": []}, {"argument": "complainant", "role": "victim", "argument_pos": []}, {"argument": "2.15 pm", "role": "time", "argument_pos": []}, {"argument": "in bitcoins", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "On Sunday , the MGM hospital in Navi Mumbai was attacked by a ransomware .", "event": [{"event_trigger": "was attacked", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransomware", "role": "tool", "argument_pos": []}, {"argument": "Navi Mumbai", "role": "place", "argument_pos": []}, {"argument": "the MGM hospital", "role": "victim", "argument_pos": []}, {"argument": "Sunday", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Its data was locked out and the fraudsters demanded payment in bitcoins .", "event": [{"event_trigger": "demanded payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "in bitcoins", "role": "payment method", "argument_pos": []}, {"argument": "data was locked out", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "A vulnerability in some versions of the Oracle Solaris enterprise OS could allow attackers to edit code in the memory and exploit it to gain full root control over a machine .", "event": [{"event_trigger": "exploit", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "A vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "some versions", "role": "vulnerable system version", "argument_pos": []}, {"argument": "the Oracle Solaris enterprise OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "allow attackers to edit code in the memory", "role": "capabilities", "argument_pos": []}, {"argument": "gain full root control over a machine", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The privilege escalation vulnerability -- now patched -- is present in current versions of Oracle Solaris 10 and 11 running Sun StorageTek Availability Suite ( AVS ) for the filesystem and could be used to access to a low - level user or service account and , from there , gain complete root access to the system .", "event": [{"event_trigger": "is present in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle Solaris 10 and 11", "role": "vulnerable system", "argument_pos": []}, {"argument": "the filesystem", "role": "vulnerable system", "argument_pos": []}, {"argument": "Sun StorageTek Availability Suite ( AVS )", "role": "vulnerable system", "argument_pos": []}, {"argument": "gain complete root access to the system", "role": "capabilities", "argument_pos": []}, {"argument": "current versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "The memory corruption bug has been uncovered and detailed by researchers at Trustwave -- and its origins go all the way back to 2007 .", "event": [{"event_trigger": "has been uncovered and detailed", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "The memory corruption bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Trustwave", "role": "discoverer", "argument_pos": []}, {"argument": "2007", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The original issue was disclosed in 2009 and apparently fixed , but researchers revisited the code this year only to find the fix was partial and loopholes still allowed the execution of malicious code .", "event": [{"event_trigger": "revisited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The origins of the exploit , CVE -2018-2892 , lie in one small fragment of code which contains a number of separate vulnerabilities around the dereferencing pointer , the means of getting values stored in a specific memory location .", "event": [{"event_trigger": "lie in", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "separate vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-2892", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "the exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" Attackers can exploit this vulnerability to take access to a low - level user or service account and gain complete root access to the entire system , \" Neil Kettle , application security principal consultant at SpiderLabs at Trustwave , told ZDNet .", "event": [{"event_trigger": "exploit", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "gain complete root access to the entire system", "role": "capabilities", "argument_pos": []}, {"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "take access to a low - level user or service account", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Once the attacker has access to any account , this vulnerability can be very easily exploited to gain complete root control over the system , \" said Kettle .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "this vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "gain complete root control over the system", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Nonetheless , Trustwave disclosed the discovery to Oracle , which has delivered a patch to fix the loophole .", "event": [{"event_trigger": "disclosed the discovery", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle", "role": "discoverer", "argument_pos": []}, {"argument": "Trustwave", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "With a bunch of security fixes released and more on the way , details have been made public of a Bluetooth bug that potentially allows miscreants to commandeer nearby devices .", "event": [{"event_trigger": "have been made public", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a Bluetooth bug", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This Carnegie - Mellon CERT vulnerability advisory on Monday laid out the cryptographic flaw : firmware or operating system drivers skip a vital check during a Diffie - Hellman key exchange between devices .", "event": [{"event_trigger": "laid out", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "This Carnegie - Mellon CERT vulnerability advisory", "role": "discoverer", "argument_pos": []}, {"argument": "the cryptographic flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "In other words , you can potentially snoop on supposedly encrypted communications between two devices to steal their info going over the air , and inject malicious commands .", "event": [{"event_trigger": "steal", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "encrypted communications between two devices", "role": "attack pattern", "argument_pos": []}, {"argument": "their info", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The bug 's status in Android is confusing : while it does n't appear in the operating system project 's July monthly bulletin , phone and tablet manufacturers like LG and Huawei list the bug as being patched in the , er , July security update .", "event": [{"event_trigger": "being patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "Huawei", "role": "releaser", "argument_pos": []}, {"argument": "LG", "role": "releaser", "argument_pos": []}, {"argument": "phone and tablet manufacturers", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Indeed , silicon vendor patches for CVE -2018-5383 are already rolling out among larger gadget and device makers , with Lenovo and Dell posting updates in the past month or so .", "event": [{"event_trigger": "rolling out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "larger gadget and device makers", "role": "releaser", "argument_pos": []}, {"argument": "CVE -2018-5383", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "silicon vendor patches", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The e-commerce giant on its blog ' Flipkart stories ' said that people need to be beware of email , call , SMS , WhatsApp message or any social media message which claims to be offering unbelievable discounts and offers from Flipkart .", "event": [{"event_trigger": "claims to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}, {"argument": "offering unbelievable discounts", "role": "attack pattern", "argument_pos": []}, {"argument": "email", "role": "tool", "argument_pos": []}, {"argument": "SMS", "role": "tool", "argument_pos": []}, {"argument": "WhatsApp message", "role": "tool", "argument_pos": []}, {"argument": "social media message", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Flipkart said : “ Be warned that these messages are not sent by official Flipkart channels , but by fraudsters and scammers who intend to deceive you .", "event": [{"event_trigger": "sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "these messages", "role": "tool", "argument_pos": []}, {"argument": "official Flipkart channels", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Fraudsters intend to make a fast buck by misappropriating the familiar and trustworthy name of Flipkart .", "event": [{"event_trigger": "misappropriating the familiar", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The content of the fake messages or calls sent by the fraudulent may include references to tempting deals , discounts and offers on Flipkart .", "event": [{"event_trigger": "sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the fake messages", "role": "tool", "argument_pos": []}, {"argument": "tempting deals , discounts and offers", "role": "attack pattern", "argument_pos": []}, {"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The fake messages may closely resemble the Flipkart ’s official logos , typefaces and brand colour while some may also contain the word ‘ Flipkart ’ in the URL .", "event": [{"event_trigger": "closely resemble", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The fake messages", "role": "tool", "argument_pos": []}, {"argument": "official logos", "role": "trusted entity", "argument_pos": []}, {"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}, {"argument": "the URL", "role": "trusted entity", "argument_pos": []}, {"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Such websites pretend to be associated with Flipkart by using similar - looking and similar - sounding names .", "event": [{"event_trigger": "pretend to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}, {"argument": "using similar - looking and similar - sounding names", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "2 ) WhatsApp , Facebook Messenger and / or other social messaging platforms : Fraudsters may try to send the customers messages via social messaging platforms and many have also reported the same .", "event": [{"event_trigger": "send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Fraudsters", "role": "attacker", "argument_pos": []}, {"argument": "the customers messages", "role": "tool", "argument_pos": []}, {"argument": "via social messaging platforms", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The person might lure customers by offering free gifts or by saying that your mobile number has been selected via a lucky draw , etc. .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The person", "role": "attacker", "argument_pos": []}, {"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "offering free gifts", "role": "attack pattern", "argument_pos": []}, {"argument": "via a lucky draw", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "They may also lure you to a website appearing very similar to Flipkart or send you a fake fabricated certificate .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "They", "role": "attacker", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "a website", "role": "tool", "argument_pos": []}, {"argument": "Flipkart", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "They may also claim to be Flipkart employees or partners and may display fake identifiation as proof .", "event": [{"event_trigger": "claim to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "They", "role": "attacker", "argument_pos": []}, {"argument": "Flipkart employees or partners", "role": "trusted entity", "argument_pos": []}, {"argument": "display fake identifiation as proof", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "4 ) Phishing ( Fake Emails ) : Phishing is a fraudulent attempt to obtain sensitive information such as usernames , passwords , and credit card details for malicious reasons by disguising as a trustworthy entity in an electronic communication .", "event": [{"event_trigger": "Phishing", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "obtain sensitive information", "role": "purpose", "argument_pos": []}, {"argument": "a trustworthy entity", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "Phishing emails are sent by fraudsters .", "event": [{"event_trigger": "are sent", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Phishing emails", "role": "tool", "argument_pos": []}, {"argument": "fraudsters", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "LabCorp , one of the largest clinical labs in the U.S. , said the Samsam ransomware attack that forced their systems offline was contained quickly and did n't result in a data breach .", "event": [{"event_trigger": "the Samsam ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "forced their systems offline", "role": "attack pattern", "argument_pos": []}, {"argument": "LabCorp", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "According to sources familiar with the investigation , the Samsam attack at LabCorp started at midnight on July 13 .", "event": [{"event_trigger": "attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the Samsam", "role": "tool", "argument_pos": []}, {"argument": "midnight on July 13", "role": "time", "argument_pos": []}, {"argument": "LabCorp", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "According to NetFlow management and traffic monitoring , nothing left the network during the attack , so the company is confident that there was no data breach .", "event": [{"event_trigger": "data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In March , based on the current value of Bitcoin at the time , it was estimated that the group had earned nearly $ 850,000 USD from their victims , who paid the ransom demands .", "event": [{"event_trigger": "ransom demands", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 850,000 USD", "role": "price", "argument_pos": []}, {"argument": "the group", "role": "attacker", "argument_pos": []}, {"argument": "March", "role": "time", "argument_pos": []}, {"argument": "their victims", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "LabCorp experienced a breach this past weekend , which it nows says was a ransomware attack .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "past weekend", "role": "time", "argument_pos": []}, {"argument": "LabCorp", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The intrusion has also prompted concerns that patient data may have also been stolen .", "event": [{"event_trigger": "been stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "patient data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "One of the biggest clinical lab testing companies in the world , LabCorp , was hit with a \" new variant of ransomware \" over the weekend .", "event": [{"event_trigger": "was hit", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "LabCorp", "role": "victim", "argument_pos": []}, {"argument": "new variant of ransomware", "role": "tool", "argument_pos": []}, {"argument": "over the weekend", "role": "time", "argument_pos": []}, {"argument": "clinical lab testing companies", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "But according to The Wall Street Journal , the company was hit with a strain known as SamSam .", "event": [{"event_trigger": "was hit", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "SamSam", "role": "tool", "argument_pos": []}, {"argument": "the company", "role": "victim", "argument_pos": []}, {"argument": "strain", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "In March , the same strain attacked the city of Atlanta 's IT network .", "event": [{"event_trigger": "attacked", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "March", "role": "time", "argument_pos": []}, {"argument": "the same strain", "role": "tool", "argument_pos": []}, {"argument": "IT network", "role": "victim", "argument_pos": []}, {"argument": "city of Atlanta", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Like other ransomware variants , SamSam will effectively lock down a computer , encrypting all the files inside , and then demand the victim pay up to free the system .", "event": [{"event_trigger": "demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "SamSam", "role": "tool", "argument_pos": []}, {"argument": "lock down a computer", "role": "attack pattern", "argument_pos": []}, {"argument": "encrypting all the files inside", "role": "attack pattern", "argument_pos": []}, {"argument": "the victim", "role": "victim", "argument_pos": []}, {"argument": "ransomware variants", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "In the Atlanta attack , the anonymous hackers demanded $ 51,000 , which the city government reportedly refused to pay .", "event": [{"event_trigger": "the Atlanta attack", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "How much the hackers are demanding from LabCorp is n't clear ; the company declined to answer further questions about the attack or if it will pay the ransom .", "event": [{"event_trigger": "are demanding", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "LabCorp", "role": "victim", "argument_pos": []}, {"argument": "the hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "This prompted fears that patient data may have been stolen .", "event": [{"event_trigger": "have been stolen", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "patient data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "On Thursday , LabCorp issued a new statement and said the attack was a ransomware strain .", "event": [{"event_trigger": "the attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransomware strain", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "At this point , the company has found \" no evidence of theft or misuse of data , \" but it 's continuing to investigate .", "event": [{"event_trigger": "theft", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "data", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "\" We are trying to ascertain the Internet Protocol Address ( IP ) from where the email ( demanding ransom ) originated , \" Doshi said Computer systems of a private hospital in Navi Mumbai have come under a malware attack , with attackers seeking ransom in Bitcoins , police today said .", "event": [{"event_trigger": "seeking ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "attackers", "role": "attacker", "argument_pos": []}, {"argument": "in Bitcoins", "role": "payment method", "argument_pos": []}, {"argument": "a malware attack", "role": "attack pattern", "argument_pos": []}, {"argument": "Navi Mumbai", "role": "place", "argument_pos": []}, {"argument": "a private hospital", "role": "victim", "argument_pos": []}, {"argument": "Computer systems", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The cyber attack on the computer systems of Mahatma Gandhi Mission Hospital came to light on July 15 , police said .", "event": [{"event_trigger": "The cyber attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the computer systems", "role": "victim", "argument_pos": []}, {"argument": "Mahatma Gandhi Mission Hospital", "role": "victim", "argument_pos": []}, {"argument": "July 15", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Hospital administrators found the systems locked , with an encrypted message by unidentified attackers demanding ransom in Bitcoins to unlock it , said Tushar Doshi , Deputy Commissioner of Police ( Crime ) .", "event": [{"event_trigger": "demanding ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "unidentified attackers", "role": "attacker", "argument_pos": []}, {"argument": "in Bitcoins", "role": "payment method", "argument_pos": []}, {"argument": "the systems locked , with an encrypted message", "role": "attack pattern", "argument_pos": []}, {"argument": "Hospital administrators", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Such attacks are described as ` ransomware ' attacks , where a malicious software enters the victim 's computer system , and the attackers threaten to publish the data or block access to it unless a ransom is paid .", "event": [{"event_trigger": "ransomware ' attacks", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "\" We are trying to ascertain the Internet Protocol Address ( IP ) from where the email ( demanding ransom ) originated , \" Doshi said .", "event": [{"event_trigger": "demanding ransom", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Among the recent cyber attacks of this kind , the ` WannaCry ransomware attack ' of May 2017 infected more than 2,30,000 computers across 150 countries .", "event": [{"event_trigger": "WannaCry ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "May 2017", "role": "time", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Scammers taking advantage of tax time are trying to trick Australians into handing over their personal details with the promise of a tax refund through a fake myGov form .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Australians", "role": "victim", "argument_pos": []}, {"argument": "Scammers", "role": "attacker", "argument_pos": []}, {"argument": "handing over their personal details", "role": "purpose", "argument_pos": []}, {"argument": "the promise of a tax refund", "role": "attack pattern", "argument_pos": []}, {"argument": "a fake myGov form", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "\" Scammers have long used the promise of a tax refund to trick people into sharing their personal information or to download malware . \"", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "victim", "argument_pos": []}, {"argument": "used the promise of a tax refund", "role": "attack pattern", "argument_pos": []}, {"argument": "Scammers", "role": "attacker", "argument_pos": []}, {"argument": "sharing their personal information", "role": "purpose", "argument_pos": []}, {"argument": "download malware", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The phishing email claims to come from myGov and has the subject line , \" Important information regarding your account \" , as well as the myGov logo .", "event": [{"event_trigger": "claims to come from", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "myGov", "role": "trusted entity", "argument_pos": []}, {"argument": "The phishing email", "role": "tool", "argument_pos": []}, {"argument": "the myGov logo", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The link leads to a fake tax refund claim form , asking for personal details such as email , password , and credit card details .", "event": [{"event_trigger": "leads", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "fake tax refund", "role": "tool", "argument_pos": []}, {"argument": "The link", "role": "tool", "argument_pos": []}, {"argument": "asking for personal details", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "\" Earlier this month scammers used a cloned version of myGov website in an attempt to lure in victims with a phishing email .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "myGov website", "role": "trusted entity", "argument_pos": []}, {"argument": "scammers", "role": "attacker", "argument_pos": []}, {"argument": "Earlier this month", "role": "time", "argument_pos": []}, {"argument": "victims", "role": "victim", "argument_pos": []}, {"argument": "a phishing email", "role": "tool", "argument_pos": []}, {"argument": "used a cloned version", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle released its latest Critical Patch Update on July 18 , fixing 334 vulnerabilities across the company 's product portfolio .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle", "role": "releaser", "argument_pos": []}, {"argument": "July 18", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Among the products patched by Oracle are Oracle Database Server , Oracle Global Lifecycle Management , Oracle Fusion Middleware , Oracle E-Business Suite , Oracle PeopleSoft , Oracle Siebel CRM , Oracle Industry Applications , Oracle Java SE , Oracle Virtualization , Oracle MySQL and Oracle Sun Systems Products Suite .", "event": [{"event_trigger": "patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the products", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}, {"argument": "Oracle Sun Systems Products Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle MySQL", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Virtualization", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Java SE", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Industry Applications", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Siebel CRM", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle PeopleSoft", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle E-Business Suite", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Fusion Middleware", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Global Lifecycle Management", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle Database Server", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "\" 90 percent of the critical vulnerabilities addressed in this Critical Patch Update are for non-Oracle CVEs . \"", "event": [{"event_trigger": "addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the critical vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Of the 334 issues fixed in the July Critical Patch Update , 37 percent were for third - party components included in Oracle product distributions .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the 334 issues", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle 's namesake database was patched for three issues , one of which is remotely exploitable without user authentication .", "event": [{"event_trigger": "was patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "three issues", "role": "vulnerability", "argument_pos": []}, {"argument": "namesake database", "role": "vulnerable system", "argument_pos": []}, {"argument": "remotely exploitable without user authentication", "role": "issues addressed", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle 's Financial Services application received the highest total number of patches at 56 , with 21 identified as being remotely exploitable without user authentication .", "event": [{"event_trigger": "received", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "patches", "role": "patch", "argument_pos": []}, {"argument": "Financial Services application", "role": "vulnerable system", "argument_pos": []}, {"argument": "being remotely exploitable without user authentication", "role": "issues addressed", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle 's Fusion Middleware , on the other hand , got 44 new security fixes , with 38 of them rated as being critical .", "event": [{"event_trigger": "got", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security fixes", "role": "patch", "argument_pos": []}, {"argument": "Fusion Middleware", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Oracle Enterprise Manager Products were patched for 16 issues , all of which are remotely exploitable without authentication .", "event": [{"event_trigger": "were patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Oracle Enterprise Manager Products", "role": "vulnerable system", "argument_pos": []}, {"argument": "16 issues", "role": "vulnerability", "argument_pos": []}, {"argument": "remotely exploitable without authentication", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Looking at flaws in Java , Oracle 's July CPU provides eight security fixes , though organizations likely need to be cautious when applying the patches , as certain functionality has been removed .", "event": [{"event_trigger": "provides", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "security fixes", "role": "patch", "argument_pos": []}, {"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "Java", "role": "vulnerable system", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "\" Several actions taken to fix Java SE vulnerabilities in the July CPU are likely to break the functionality of certain applications , \" security firm Waratek warned in an advisory .", "event": [{"event_trigger": "fix", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Java SE vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "\" Application owners who apply binary patches should be extremely cautious and thoroughly test their applications before putting patches into production . \"", "event": [{"event_trigger": "apply", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "binary patches", "role": "patch", "argument_pos": []}, {"argument": "Application owners", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "At 334 fixed flaws , the July update is larger than last Critical Patch Update released on Jan 15 , which provided patches for 237 flaws .", "event": [{"event_trigger": "released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Jan 15", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "While the number of patches issues has grown , Matias Mevied , Oracle security researcher at Onapsis , commented that Oracle is working in the right way , fixing the reported vulnerabilities and is getting faster every year .", "event": [{"event_trigger": "fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the reported vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Oracle", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Yeah , the Japanese gaming firm has only gone and fixed it , according to console hacker Michael .", "event": [{"event_trigger": "fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the Japanese gaming firm", "role": "releaser", "argument_pos": []}, {"argument": "it", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Michael , who goes by the Twitter handle @SciresM , tweeted that it 's bad news for console hackers and Nintendo is pushing out new console models with a fix that stops tech - savvy folks from messing around with the software that the hybrid games console can boot with .", "event": [{"event_trigger": "is pushing out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Nintendo", "role": "releaser", "argument_pos": []}, {"argument": "a fix", "role": "patch", "argument_pos": []}, {"argument": "console models", "role": "vulnerable system", "argument_pos": []}, {"argument": "games console", "role": "vulnerable system", "argument_pos": []}, {"argument": "software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw was thought to be un-patchable as it affected the Nvidia Tegra X1 chip that sits at the heart of the console .", "event": [{"event_trigger": "affected", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the console", "role": "vulnerable system", "argument_pos": []}, {"argument": "the Nvidia Tegra X1 chip", "role": "vulnerable system", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The patch involves using a system called ‘ iPatches ' which updates parts of the code applying to the Tegra X1 's fuses which plugs the boot hacking exploit .", "event": [{"event_trigger": "updates", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "iPatches", "role": "patch", "argument_pos": []}, {"argument": "The patch", "role": "patch", "argument_pos": []}, {"argument": "the Tegra X1 's fuses", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Current consoles out in the wild will still be vulnerable due to the patch needing to be applied at a hardware level , but new models wo n't be susceptible to the hack .", "event": [{"event_trigger": "be vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Current consoles", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "So while the new Switchers will come off the production line immune to the Tegra X1 exploit , they will still be vulnerable to other hacking techniques .", "event": [{"event_trigger": "be vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "they", "role": "vulnerable system", "argument_pos": []}, {"argument": "the new Switchers", "role": "vulnerable system", "argument_pos": []}, {"argument": "Tegra X1 exploit", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "With this in mind , Michael advises that people keen to crack into their Switch consoles should not apply any updates , as the older version of the console 's firmware is the easier it 's to hack .", "event": [{"event_trigger": "apply", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "older version", "role": "vulnerable system version", "argument_pos": []}, {"argument": "firmware", "role": "vulnerable system", "argument_pos": []}, {"argument": "console", "role": "vulnerable system", "argument_pos": []}, {"argument": "Switch consoles", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "So while the un-patchable flaw may have been fixed the current iteration of the Switch is still no un-hackable .", "event": [{"event_trigger": "have been fixed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the un-patchable flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "the Switch", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Hard Rock Hotels & Casinos issued a statement informing customers of the data breach last week , which took place due to the Sabre Hospitality Solutions SynXis third - party reservation system .", "event": [{"event_trigger": "the data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "last week", "role": "time", "argument_pos": []}, {"argument": "reservation system", "role": "victim", "argument_pos": []}, {"argument": "customers", "role": "victim", "argument_pos": []}, {"argument": "Sabre Hospitality Solutions SynXis", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The hotel chain , which operates 176 cafes , 24 hotels and 11 casinos in 75 countries , said SynXis , the backbone infrastructure for reservations made through hotels and travel agencies , provided the avenue for data theft and the exposure of customer information .", "event": [{"event_trigger": "data theft", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "\" The unauthorized party first obtained access to payment card and other reservation information on August 10 , 2016 , \" the hotel chain said .", "event": [{"event_trigger": "obtained access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "The unauthorized party", "role": "attacker", "argument_pos": []}, {"argument": "payment card", "role": "compromised data", "argument_pos": []}, {"argument": "reservation information", "role": "compromised data", "argument_pos": []}, {"argument": "August 10 , 2016", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "\" The last access to payment card information was on March 9 , 2017 . \"", "event": [{"event_trigger": "The last access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "payment card information", "role": "compromised data", "argument_pos": []}, {"argument": "March 9 , 2017", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "According to Sabre , an \" unauthorized party gained access to account credentials that permitted unauthorized access to payment card information , as well as certain reservation information \" for a \" subset \" of reservations .", "event": [{"event_trigger": "gained access", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "account credentials", "role": "compromised data", "argument_pos": []}, {"argument": "unauthorized party", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "The attacker was able to grab unencrypted payment card information for hotel reservations , including cardholder names , card numbers , and expiration dates .", "event": [{"event_trigger": "grab", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "The attacker", "role": "attacker", "argument_pos": []}, {"argument": "payment card information", "role": "compromised data", "argument_pos": []}, {"argument": "cardholder names", "role": "compromised data", "argument_pos": []}, {"argument": "card numbers", "role": "compromised data", "argument_pos": []}, {"argument": "expiration dates", "role": "compromised data", "argument_pos": []}, {"argument": "hotel", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In some cases , security codes were also exposed , alongside guest names , email addresses , phone numbers , and addresses .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "email addresses", "role": "compromised data", "argument_pos": []}, {"argument": "guest names", "role": "compromised data", "argument_pos": []}, {"argument": "phone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "addresses", "role": "compromised data", "argument_pos": []}, {"argument": "security codes", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "According to NBC , Sabre was also at fault and cyberattackers were able to slurp credit card , security code , and password information through the booking portal .", "event": [{"event_trigger": "slurp", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "credit card", "role": "compromised data", "argument_pos": []}, {"argument": "cyberattackers", "role": "attacker", "argument_pos": []}, {"argument": "security code", "role": "compromised data", "argument_pos": []}, {"argument": "password information", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "In some cases , email addresses , phone numbers , and street addresses were also allegedly exposed .", "event": [{"event_trigger": "exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "street addresses", "role": "compromised data", "argument_pos": []}, {"argument": "phone numbers", "role": "compromised data", "argument_pos": []}, {"argument": "email addresses", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "These hotel chains are far from the only ones that have suffered a data breach in recent years .", "event": [{"event_trigger": "a data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "hotel chains", "role": "victim", "argument_pos": []}, {"argument": "recent years", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Back in April , InterContinental admitted that a data breach first believed to be isolated to 12 properties actually harmed roughly 1,200 , resulting in the exposure of customer credit card data .", "event": [{"event_trigger": "a data breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "InterContinental", "role": "victim", "argument_pos": []}, {"argument": "April", "role": "time", "argument_pos": []}, {"argument": "12", "role": "number of victim", "argument_pos": []}, {"argument": "properties", "role": "victim", "argument_pos": []}, {"argument": "1,200", "role": "number of data", "argument_pos": []}]}], "task": "EE"} {"text": "Thunderbird has pushed code with fixes for a dozen security vulnerabilities – including the EFAIL encryption mess that emerged in May .", "event": [{"event_trigger": "has pushed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Thunderbird", "role": "releaser", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "a dozen security vulnerabilities", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The EFAIL - specific fixes address two errors in Thunderbird 's handling of encrypted messages : CVE -2018-12372 , in which an attacker can build S / MIME and PGP decryption oracles in HTML messages ; and CVE -2018-12373 , in which S / MIME plaintext can be leaked if a message is forwarded .", "event": [{"event_trigger": "address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The EFAIL - specific fixes", "role": "patch", "argument_pos": []}, {"argument": "two errors", "role": "vulnerability", "argument_pos": []}, {"argument": "CVE -2018-12372", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "CVE -2018-12373", "role": "common vulnerabilities and exposures", "argument_pos": []}]}], "task": "EE"} {"text": "If you fall for the bait , you ’re transferred to a live human who will try anything to get you to hand over your credit - card or bank account info .", "event": [{"event_trigger": "fall for the bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "hand over your credit - card or bank account info", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "The robocalls deliver a recorded message claiming to be from the Chinese consulate , saying the recipient is in trouble with Chinese officials , or sometimes that a package is waiting at the Chinese consulate that needs to be picked up .", "event": [{"event_trigger": "claiming to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "The robocalls deliver a recorded message", "role": "attack pattern", "argument_pos": []}, {"argument": "the Chinese consulate", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The scammers are also upping the ante with a tech trick called “ spoofing . ”", "event": [{"event_trigger": "spoofing", "event_type": "phishing", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "Spoofed calls can fake caller ID numbers , making them look like they ’re coming from a familiar number , nearby area code , your hometown or in this case , the Chinese consulate , according to the Federal Communications Commission , which also issued an alert .", "event": [{"event_trigger": "fake", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "caller ID numbers", "role": "trusted entity", "argument_pos": []}, {"argument": "Spoofed calls", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "This scam uses many of the same ploys used on unsuspecting English speakers , say in the scam where the caller pretends to be from the IRS and is demanding payments on back taxes that do n’t really exist .", "event": [{"event_trigger": "pretends to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the caller", "role": "attacker", "argument_pos": []}, {"argument": "the IRS", "role": "trusted entity", "argument_pos": []}, {"argument": "is demanding payments", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "After observing attacks on customers , Cisco is telling users to install the fix for a recently disclosed denial - of - service flaw affecting a number of its security appliances .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "a recently disclosed denial - of - service flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "its security appliances", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw , tracked as CVE -2018-0296 , was detailed in an advisory on June 6 and affects Cisco ASA Software and Cisco Firepower Threat Defense ( FTD ) Software .", "event": [{"event_trigger": "tracked as", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-0296", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "June 6", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "\" Cisco strongly recommends that customers upgrade to a fixed software release to remediate this issue , \" Omar Santos of Cisco 's Product Security Incident Response Team warned on June 22 .", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "a fixed software release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Santos notes that a unauthenticated , remote attacker could cause a device to reload unexpectedly and cause a denial - of - service ( DoS ) condition .", "event": [{"event_trigger": "notes", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "remote attacker could cause a device to reload unexpectedly", "role": "capabilities", "argument_pos": []}, {"argument": "a denial - of - service ( DoS )", "role": "capabilities", "argument_pos": []}, {"argument": "Santos", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has also updated the advisory for CVE -2018-0296 with details about the attacks .", "event": [{"event_trigger": "has also updated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-0296", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "the advisory", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "The researcher who found the flaw , Michał Bentkowski from Polish security firm Securitum , gave a brief description of the root cause in a tweet shortly after Cisco disclosed the bug .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The researcher", "role": "discoverer", "argument_pos": []}, {"argument": "the flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Michał Bentkowski", "role": "discoverer", "argument_pos": []}, {"argument": "Polish security firm Securitum", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "Bentkowsky reported the issue to Cisco as a way to use directory - traversal techniques to disclose information to an unauthenticated attacker .", "event": [{"event_trigger": "reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Bentkowsky", "role": "discoverer", "argument_pos": []}, {"argument": "the issue", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "use directory - traversal techniques to disclose information", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "Bleeping Computer identified two proof - of - concept exploits for CVE -2018-0296 on GitHub .", "event": [{"event_trigger": "identified", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "CVE -2018-0296", "role": "common vulnerabilities and exposures", "argument_pos": []}, {"argument": "Bleeping Computer", "role": "discoverer", "argument_pos": []}, {"argument": "proof - of - concept exploits", "role": "vulnerability", "argument_pos": []}, {"argument": "GitHub", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "One attempts to extract user names from Cisco ASA .", "event": [{"event_trigger": "extract", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "user names", "role": "compromised data", "argument_pos": []}, {"argument": "Cisco ASA", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Major corporations across the world have been hit by a wave of ransomware attacks that encrypt computers and then demand that users pay $ 300 to a bitcoin address to restore access .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 300", "role": "price", "argument_pos": []}, {"argument": "a bitcoin address", "role": "payment method", "argument_pos": []}]}], "task": "EE"} {"text": "Today , one of the largest drug makers in the U.S. , Merck , reported being infected by the malware , as did the multinational law firm DLA Piper , which counts more than 20 offices in the U.S. Heritage Valley Health Systems , a health care network that runs two hospitals in Western Pennsylvania , also confirmed in a statement to Recode on Tuesday that it was a victim of the same ransomware attack that has spread around the globe .", "event": [{"event_trigger": "the same ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "victim", "role": "victim", "argument_pos": []}, {"argument": "Tuesday", "role": "time", "argument_pos": []}, {"argument": "Western Pennsylvania", "role": "place", "argument_pos": []}, {"argument": "hospitals", "role": "victim", "argument_pos": []}, {"argument": "a health care network", "role": "victim", "argument_pos": []}, {"argument": "Heritage Valley Health Systems", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The malware , which has been dubbed NotPetya , has been confirmed by multiple security firms to resemble the WannaCry ransomware attack , which in May infected hundreds of thousands of computers by taking advantage of a National Security Agency hacking tool called Eternal Blue .", "event": [{"event_trigger": "the WannaCry ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "NotPetya", "role": "tool", "argument_pos": []}, {"argument": "May", "role": "time", "argument_pos": []}, {"argument": "computers", "role": "victim", "argument_pos": []}, {"argument": "taking advantage of a National Security Agency hacking tool called Eternal Blue", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Eternal Blue takes advantage of a vulnerability in the Windows operating system , for which Microsoft issued a patch earlier this year .", "event": [{"event_trigger": "issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Microsoft", "role": "releaser", "argument_pos": []}, {"argument": "a patch", "role": "patch", "argument_pos": []}, {"argument": "this year", "role": "time", "argument_pos": []}, {"argument": "the Windows operating system", "role": "vulnerable system", "argument_pos": []}, {"argument": "a vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Eternal Blue takes advantage", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "“ Our initial analysis found that the ransomware uses multiple techniques to spread , including one which was addressed by a security update previously provided for all platforms from Windows XP to Windows 10 , ” Microsoft said in a statement to Recode .", "event": [{"event_trigger": "was addressed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a security update", "role": "patch", "argument_pos": []}, {"argument": "all platforms", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows XP", "role": "vulnerable system", "argument_pos": []}, {"argument": "Windows 10", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "What ’s worse than ransomware that scrambles all your files and demands money for the key to unlock them and get them back ?", "event": [{"event_trigger": "demands money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "ransomware", "role": "tool", "argument_pos": []}, {"argument": "scrambles all your files", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Then they let fly on all of those identified devices at once , giving them a much higher chance of scrambling at least some computers that are critical to the workflow of your company , Finally , they make a payment demand , typically charging a few thousand dollars for each individual computer you want to unlock , but also offering an all - you - can - eat deal of $ 50,000 to decrypt everything .", "event": [{"event_trigger": "payment demand", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "they", "role": "attacker", "argument_pos": []}, {"argument": "a few thousand dollars", "role": "price", "argument_pos": []}, {"argument": "individual computer", "role": "victim", "argument_pos": []}, {"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "$ 50,000", "role": "price", "argument_pos": []}, {"argument": "also offering an all - you - can - eat deal", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The bad news is that this WannaCrypt “ demanding money with menaces ” threat email is very widespread – we ’ve had people worried about it from all over , which is why we decided to write up this warning .", "event": [{"event_trigger": "demanding money", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "WannaCrypt", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has released fixes for 34 flaws in its software , including 24 that affect its FXOS software for Firepower firewalls and NX - OS software for Nexus switches .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Nexus switches", "role": "vulnerable system", "argument_pos": []}, {"argument": "its FXOS software", "role": "vulnerable system", "argument_pos": []}, {"argument": "Firepower firewalls", "role": "vulnerable system", "argument_pos": []}, {"argument": "NX - OS software", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco 's June updates include fixes for five critical arbitrary code execution vulnerabilities affecting FXOS and NX - OS and 19 high - rated flaws affecting the software .", "event": [{"event_trigger": "affecting", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "five critical arbitrary code execution vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "FXOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "NX - OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "19 high - rated flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Four of the critical flaws affect FXOS and NX - OS Cisco Fabric Services , while the fifth one affects the NX - API feature of NX - OS .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "FXOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "NX - OS Cisco Fabric Services", "role": "vulnerable system", "argument_pos": []}, {"argument": "the critical flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Multiple switches are vulnerable if they 've been configured to use Cisco Fabric Services , including its Nexus 2000 series through to Nexus 9000 series switches , as well as Cisco 's Firepower 4100 Series Next - Gen Firewalls and other hardware .", "event": [{"event_trigger": "are vulnerable", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Multiple switches", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco has already rolled out fixes in some releases of FXOS and NX - OS .", "event": [{"event_trigger": "has already rolled out", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "NX - OS", "role": "vulnerable system", "argument_pos": []}, {"argument": "FXOS", "role": "vulnerable system", "argument_pos": []}, {"argument": "some releases", "role": "patch", "argument_pos": []}, {"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco posted a blog this week explaining why it often fixes bugs in IOS and NX - OS releases before disclosing them in an advisory .", "event": [{"event_trigger": "fixes", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "bugs", "role": "vulnerability", "argument_pos": []}, {"argument": "Cisco", "role": "releaser", "argument_pos": []}, {"argument": "it", "role": "releaser", "argument_pos": []}, {"argument": "IOS and NX - OS releases", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "It 's a practice that appears to cause confusion for customers wondering why it has n't told them fixed code has been available for several months before it discloses them .", "event": [{"event_trigger": "has been available", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixed code", "role": "patch", "argument_pos": []}, {"argument": "several months", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Cisco 's answer is that some flaws affect more than 50 versions of its software .", "event": [{"event_trigger": "affect", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "its software", "role": "vulnerable system", "argument_pos": []}, {"argument": "flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "\" There have been some questions as to why creating fixes and releasing updates can take several weeks , or sometimes even months , before an advisory is published , \" Cisco 's Customer Assurance Security Programs team wrote .", "event": [{"event_trigger": "releasing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "updates", "role": "patch", "argument_pos": []}, {"argument": "several weeks", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The number of affected versions that will be updated can range from single digits to nearly 50 or more .", "event": [{"event_trigger": "will be updated", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "We are committed to issuing fixes for every one of those supported versions .", "event": [{"event_trigger": "are committed to issuing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "fixes", "role": "patch", "argument_pos": []}, {"argument": "We", "role": "releaser", "argument_pos": []}]}], "task": "EE"} {"text": "\" \" If we disclosed the vulnerability after only fixing one release , we would unnecessarily expose all customers running other releases to potential exploitation once details about the attack itself became public .", "event": [{"event_trigger": "fixing", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "one release", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "\" There are also 10 medium - severity flaws , including one that affects some WebEx endpoints due to an already disclosed flaw in Nvidia 's Tegra TX1 chips .", "event": [{"event_trigger": "affects", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "WebEx endpoints", "role": "vulnerable system", "argument_pos": []}, {"argument": "disclosed flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "Nvidia 's Tegra TX1 chips", "role": "vulnerable system", "argument_pos": []}, {"argument": "10 medium - severity flaws", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Liberty Life has fallen victim to a ransomware attack , with the personal data of millions of the insurance company ’s customers potentially at stake .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Liberty Life", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "“ An external party claims to have seized data from us , has alerted us to potential vulnerabilities in our systems and has requested compensation for this , ” a statement to customers reads .", "event": [{"event_trigger": "have seized", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "An external party", "role": "attacker", "argument_pos": []}, {"argument": "data", "role": "compromised data", "argument_pos": []}, {"argument": "us", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "It is believed that the hackers have demanded millions to prevent them from releasing sensitive data about clients .", "event": [{"event_trigger": "have demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "millions", "role": "price", "argument_pos": []}, {"argument": "the hackers", "role": "attacker", "argument_pos": []}, {"argument": "releasing sensitive data about clients", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "The engineering firm refused to meet the hackers ’ demands and the Daily Echo understands it lost access to vital data including personal information about its staff , who number around 100 .", "event": [{"event_trigger": "demands", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "The engineering firm", "role": "victim", "argument_pos": []}, {"argument": "hackers", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Businesses have been warned that such ‘ ransomware ’ attacks are on the rise and that companies need to train all staff to be vigilant .", "event": [{"event_trigger": "‘ ransomware ’ attacks", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "“ It was reported that their computer was hacked and a demand was made for £ 120,000 , ” a Dorset Police spokeswoman said .", "event": [{"event_trigger": "a demand was made", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "£ 120,000", "role": "price", "argument_pos": []}, {"argument": "was hacked", "role": "attack pattern", "argument_pos": []}, {"argument": "their computer", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The incident echoes the WannaCry ransomware attack which infected an estimated 200,000 computers globally last year , including up to 70,000 in the NHS .", "event": [{"event_trigger": "the WannaCry ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "infected an estimated 200,000 computers", "role": "attack pattern", "argument_pos": []}, {"argument": "last year", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "Matt Horan , security director of C3IA Solutions in Poole – one of the first companies to be certified by the government ’s National Cyber Security Centre – said : “ You should never pay a ransom because there is no guarantee you will get your data back .", "event": [{"event_trigger": "should never pay a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "You", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "“ If you pay a criminal to return your data there is a good chance that he or she will take the money and not decrypt the data – or even ask for more money .", "event": [{"event_trigger": "pay", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "you", "role": "victim", "argument_pos": []}, {"argument": "a criminal", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Researchers found three vulnerabilities in Foscam connected security cameras that could enable a bad actor to gain root access knowing only the camera ’s IP address .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Researchers", "role": "discoverer", "argument_pos": []}, {"argument": "three vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "security cameras", "role": "vulnerable system", "argument_pos": []}, {"argument": "gain root access knowing only the camera ’s IP address", "role": "capabilities", "argument_pos": []}, {"argument": "Foscam", "role": "vulnerable system owner", "argument_pos": []}]}], "task": "EE"} {"text": "Foscam is urging customers to update their security cameras after researchers found three vulnerabilities in that could enable a bad actor to gain root access knowing only the camera ’s IP address .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "researchers", "role": "discoverer", "argument_pos": []}, {"argument": "three vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "gain root access knowing only the camera ’s IP address", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability trifecta includes an arbitrary file - deletion bug , a shell command - injection flaw and a stack - based buffer overflow vulnerability according to the researchers at VDOO who found the flaws .", "event": [{"event_trigger": "found", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability trifecta", "role": "vulnerability", "argument_pos": []}, {"argument": "an arbitrary file - deletion bug", "role": "vulnerability", "argument_pos": []}, {"argument": "a shell command - injection flaw", "role": "vulnerability", "argument_pos": []}, {"argument": "a stack - based buffer overflow vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the flaws", "role": "vulnerability", "argument_pos": []}, {"argument": "the researchers", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "To launch an attack , an attacker would have to obtain the camera ’s IP address or DNS name .", "event": [{"event_trigger": "have to obtain", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "an attacker", "role": "attacker", "argument_pos": []}, {"argument": "IP address", "role": "compromised data", "argument_pos": []}, {"argument": "DNS name", "role": "compromised data", "argument_pos": []}, {"argument": "camera", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Generally if the camera is configured so that it has direct interface to the internet , its address might be exposed to certain internet scanners .", "event": [{"event_trigger": "be exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "its address", "role": "compromised data", "argument_pos": []}, {"argument": "certain internet scanners", "role": "attack pattern", "argument_pos": []}, {"argument": "camera", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The patches also come after reports of a hacked baby camera emerged last week , when a woman from South Carolina said a stranger hacked into her baby monitor to spy on her and her family .", "event": [{"event_trigger": "come after", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "The patches", "role": "patch", "argument_pos": []}, {"argument": "last week", "role": "time", "argument_pos": []}, {"argument": "baby camera", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Foscam , for its part , urged customers to upgrade their cameras as soon as possible , saying that “ the latest firmware for Foscam cameras utilizes protection against various types of online hacking and unauthorized access . ”", "event": [{"event_trigger": "upgrade", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "their cameras", "role": "vulnerable system", "argument_pos": []}, {"argument": "Foscam", "role": "releaser", "argument_pos": []}, {"argument": "the latest firmware", "role": "patch", "argument_pos": []}, {"argument": "Foscam cameras", "role": "vulnerable system", "argument_pos": []}, {"argument": "online hacking and unauthorized access", "role": "issues addressed", "argument_pos": []}]}], "task": "EE"} {"text": "Adobe has released a priority update to plug a critical security flaw in its popular Flash Player on Windows .", "event": [{"event_trigger": "has released", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "Adobe", "role": "releaser", "argument_pos": []}, {"argument": "a priority update", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "As per an official announcement by the company , the latest patch will address issues in Adobe Flash Player 29.0.0.171 and other earlier versions .", "event": [{"event_trigger": "will address", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the latest patch", "role": "patch", "argument_pos": []}, {"argument": "issues", "role": "vulnerability", "argument_pos": []}, {"argument": "Adobe Flash Player", "role": "vulnerable system", "argument_pos": []}, {"argument": "other earlier versions", "role": "vulnerable system", "argument_pos": []}, {"argument": "29.0.0.171", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Security firm Icebrg on Thursday announced that a zero - day vulnerability has led to exploitation in Adobe Flash specifically targeted towards users in the Middle East .", "event": [{"event_trigger": "announced", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Security firm Icebrg", "role": "discoverer", "argument_pos": []}, {"argument": "Thursday", "role": "time", "argument_pos": []}, {"argument": "Adobe Flash", "role": "vulnerable system", "argument_pos": []}, {"argument": "zero - day vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "The flaw was reported by Icebrg in collaboration with Qihoo 360 Core Security .", "event": [{"event_trigger": "was reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Icebrg", "role": "discoverer", "argument_pos": []}, {"argument": "Qihoo 360 Core Security", "role": "discoverer", "argument_pos": []}, {"argument": "The flaw", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "Of course , this is not the first instance wherein Flash Player 's vulnerabilities have been exploited .", "event": [{"event_trigger": "been exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerabilities", "role": "vulnerability", "argument_pos": []}, {"argument": "Flash Player", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "Back in October last year , the company had issued a security patch to fix a critical leak .", "event": [{"event_trigger": "had issued", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "the company", "role": "releaser", "argument_pos": []}, {"argument": "October last year", "role": "time", "argument_pos": []}, {"argument": "a security patch", "role": "patch", "argument_pos": []}]}], "task": "EE"} {"text": "Family genealogy and DNA testing site MyHeritage announced on Monday a security breach during which an attacker made off with account details for over 92 million MyHeritage users .", "event": [{"event_trigger": "breach", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "an attacker", "role": "attacker", "argument_pos": []}, {"argument": "account details", "role": "compromised data", "argument_pos": []}, {"argument": "Monday", "role": "time", "argument_pos": []}, {"argument": "92 million", "role": "number of victim", "argument_pos": []}, {"argument": "MyHeritage", "role": "victim", "argument_pos": []}, {"argument": "users", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Only emails and hashed password were exposed .", "event": [{"event_trigger": "were exposed", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "password", "role": "compromised data", "argument_pos": []}, {"argument": "emails", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "\" Since Oct 26 , 2017 ( the date of the breach ) and the present we have not seen any activity indicating that any MyHeritage accounts had been compromised . \"", "event": [{"event_trigger": "had been compromised", "event_type": "data breach", "trigger_pos": [], "arguments": [{"argument": "MyHeritage accounts", "role": "compromised data", "argument_pos": []}]}], "task": "EE"} {"text": "The MyHeritage incident marks the biggest data breach of the year , and the biggest leak since last year 's Equifax hack .", "event": [{"event_trigger": "leak", "event_type": "data breach", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "And along with phone calls , letters and email , the crooks are now using text messages , pop - ups and phony Facebook messages to lure their victims .", "event": [{"event_trigger": "lure", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "their victims", "role": "victim", "argument_pos": []}, {"argument": "the crooks", "role": "attacker", "argument_pos": []}, {"argument": "using text messages , pop - ups and phony Facebook messages", "role": "attack pattern", "argument_pos": []}]}], "task": "EE"} {"text": "Facebook Messenger Lottery Fraud Scammers are creating bogus websites that look like a legitimate lottery or sweepstakes site .", "event": [{"event_trigger": "are creating", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Scammers", "role": "attacker", "argument_pos": []}, {"argument": "bogus websites", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "In many cases , the bogus message appears to be from Publishers Clearing House ( PCH ) congratulating you on winning a big prize .", "event": [{"event_trigger": "appears to be", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the bogus message", "role": "tool", "argument_pos": []}, {"argument": "congratulating you on winning a big prize", "role": "attack pattern", "argument_pos": []}, {"argument": "Publishers Clearing House ( PCH )", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "The crooks also impersonate Facebook founder Mark Zuckerberg in some of their phony Messenger messages .", "event": [{"event_trigger": "impersonate", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "Facebook founder Mark Zuckerberg", "role": "trusted entity", "argument_pos": []}, {"argument": "The crooks", "role": "attacker", "argument_pos": []}, {"argument": "their phony Messenger messages", "role": "tool", "argument_pos": []}]}], "task": "EE"} {"text": "“ They post a fake profile of Zuckerberg on Facebook , ” Baker said .", "event": [{"event_trigger": "post", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "a fake profile", "role": "tool", "argument_pos": []}, {"argument": "They", "role": "attacker", "argument_pos": []}, {"argument": "Facebook", "role": "trusted entity", "argument_pos": []}, {"argument": "Zuckerberg", "role": "trusted entity", "argument_pos": []}]}], "task": "EE"} {"text": "“ Then they send you a message through the Facebook messenger system saying : ‘ Hi this is Mark Zuckerberg .", "event": [{"event_trigger": "send", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "through the Facebook messenger system", "role": "attack pattern", "argument_pos": []}, {"argument": "a message", "role": "tool", "argument_pos": []}, {"argument": "they", "role": "attacker", "argument_pos": []}]}], "task": "EE"} {"text": "Take the bait and click the link , and you ’ll be told to send money to claim your winnings .", "event": [{"event_trigger": "Take the bait", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "click the link", "role": "attack pattern", "argument_pos": []}, {"argument": "send money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "Facebook says it ’s working to stop the scammers who use its platform to trick people out of their money .", "event": [{"event_trigger": "trick", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "people", "role": "attacker", "argument_pos": []}, {"argument": "the scammers", "role": "attacker", "argument_pos": []}, {"argument": "out of their money", "role": "purpose", "argument_pos": []}]}], "task": "EE"} {"text": "When two ransomware attacks hit the city of Riverside in April and May , it was n’t the first time the city ’s public safety servers lost data because of a malicious virus , this newspaper found in a review of city records .", "event": [{"event_trigger": "two ransomware attacks hit", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "the city of Riverside", "role": "attacker", "argument_pos": []}, {"argument": "April", "role": "time", "argument_pos": []}, {"argument": "May", "role": "time", "argument_pos": []}]}], "task": "EE"} {"text": "The damage extends across the nation : When a library system in South Carolina faced a ransomware attack , patrons could n’t check out or return books .", "event": [{"event_trigger": "a ransomware attack", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "South Carolina", "role": "place", "argument_pos": []}, {"argument": "a library system", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "In Richmond , Indiana , the local housing agency fell victim to a $ 8,000 ransom .", "event": [{"event_trigger": "ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "$ 8,000", "role": "price", "argument_pos": []}, {"argument": "the local housing agency", "role": "victim", "argument_pos": []}, {"argument": "Indiana", "role": "place", "argument_pos": []}, {"argument": "Richmond", "role": "place", "argument_pos": []}]}], "task": "EE"} {"text": "While the hackers ’ ideal target — and the damage caused — varies , one certainty is that local governments are not exempt from the pain of ransomware , which is malicious software that threatens to block access to data or to publish it unless the infected organization pays a ransom .", "event": [{"event_trigger": "pays a ransom", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "threatens to block access to data or to publish it", "role": "attack pattern", "argument_pos": []}, {"argument": "malicious software", "role": "tool", "argument_pos": []}, {"argument": "organization", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "The ransom demands are often relatively small compared to an organization ’s overall budget , but the cost of avoiding payment can be steep , as the city of Atlanta found this year .", "event": [{"event_trigger": "The ransom demands", "event_type": "ransom", "trigger_pos": [], "arguments": []}], "task": "EE"} {"text": "An attacker demanded a $ 50,000 ransom to restore the Atlanta ’s systems , but the city ended up shelling out nearly $ 2.7 million on eight emergency contracts in an attempt to fix the problem .", "event": [{"event_trigger": "demanded", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "An attacker", "role": "attacker", "argument_pos": []}, {"argument": "$ 50,000", "role": "price", "argument_pos": []}]}], "task": "EE"} {"text": "Organizations often do n’t learn they have been infected until they ca n’t access their data or until computer messages appear demanding a ransom payment in exchange for a decryption key , according to the FBI ’s website .", "event": [{"event_trigger": "demanding a ransom payment", "event_type": "ransom", "trigger_pos": [], "arguments": [{"argument": "Organizations", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "An official in a small Michigan county has resigned after being tricked into wiring $ 50,000 to an overseas bank account .", "event": [{"event_trigger": "being tricked", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "wiring", "role": "purpose", "argument_pos": []}, {"argument": "Michigan county", "role": "victim", "argument_pos": []}, {"argument": "An official", "role": "victim", "argument_pos": []}, {"argument": "$ 50,000", "role": "damage amount", "argument_pos": []}]}], "task": "EE"} {"text": "Shiawassee County apparently was the victim of a phishing scam .", "event": [{"event_trigger": "a phishing scam", "event_type": "phishing", "trigger_pos": [], "arguments": [{"argument": "the victim", "role": "victim", "argument_pos": []}, {"argument": "Shiawassee County", "role": "victim", "argument_pos": []}]}], "task": "EE"} {"text": "Valve has patched a critical vulnerability in the Steam client which has lurked undetected for at least 10 years .", "event": [{"event_trigger": "has patched", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a critical vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "Valve", "role": "releaser", "argument_pos": []}, {"argument": "the Steam client", "role": "vulnerable system", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability impacts all versions of the gaming platform .", "event": [{"event_trigger": "impacts", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "the gaming platform", "role": "vulnerable system", "argument_pos": []}, {"argument": "all versions", "role": "vulnerable system version", "argument_pos": []}]}], "task": "EE"} {"text": "Tom Court , a security researcher hailing from Context Information Security , discovered the bug and disclosed his findings on Thursday .", "event": [{"event_trigger": "discovered", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Context Information Security", "role": "discoverer", "argument_pos": []}, {"argument": "a security researcher", "role": "discoverer", "argument_pos": []}, {"argument": "Tom Court", "role": "discoverer", "argument_pos": []}]}], "task": "EE"} {"text": "In a blog post , the researcher said that left unpatched , the bug permits threat actors to perform remote code execution ( RCE ) attacks .", "event": [{"event_trigger": "said", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "the bug", "role": "vulnerability", "argument_pos": []}, {"argument": "the researcher", "role": "discoverer", "argument_pos": []}, {"argument": "perform remote code execution ( RCE ) attacks", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "However , this addition made sure that the vulnerability would only cause a client crash if exploited -- unless a separate information leak vulnerability was also active in the exploit chain .", "event": [{"event_trigger": "exploited", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "vulnerability", "role": "vulnerability", "argument_pos": []}, {"argument": "cause a client crash", "role": "capabilities", "argument_pos": []}]}], "task": "EE"} {"text": "The vulnerability was reported to Valve on 20 February and was fixed in a beta release less than 12 hours later .", "event": [{"event_trigger": "was reported", "event_type": "discover vulnerability", "trigger_pos": [], "arguments": [{"argument": "Valve", "role": "vulnerable system owner", "argument_pos": []}, {"argument": "20 February", "role": "time", "argument_pos": []}, {"argument": "The vulnerability", "role": "vulnerability", "argument_pos": []}]}], "task": "EE"} {"text": "This patch was then pushed to a stable release on 22 March .", "event": [{"event_trigger": "was then pushed", "event_type": "patch vulnerability", "trigger_pos": [], "arguments": [{"argument": "a stable release", "role": "patch", "argument_pos": []}, {"argument": "22 March", "role": "time", "argument_pos": []}, {"argument": "This patch", "role": "patch", "argument_pos": []}]}], "task": "EE"}