Advertisements


Attackers are leveraging Follina. What can you do?

As the world is waiting for Microsoft to push out a patch for CVE-2022-30190, aka “Follina”, attackers around the world are exploiting the vulnerability in a variety of campaigns. A complex vulnerability Microsoft has described CVE-2022-3.....»»

Category: securitySource:  netsecurityJun 3rd, 2022

New UEFI vulnerabilities send firmware devs industry wide scrambling

PixieFail is a huge deal for cloud and data centers. For the rest, less so. Enlarge (credit: Nadezhda Kozhedub) UEFI firmware from five of the leading suppliers contains vulnerabilities that allow attackers with a toehol.....»»

Category: topSource:  arstechnicaRelated NewsJan 17th, 2024

Most older iPhones, Macs, and iPads are vulnerable to a new GPU security flaw

A security flaw named LeftoverLocals lets attackers access data that has been processed in a device's GPU, and while Apple says A17 iPhone and M3 Macs have fixes, older models do not.Researchers show how a GPU vulnerability could be exploitedThe repo.....»»

Category: appleSource:  appleinsiderRelated NewsJan 17th, 2024

New UEFI vulnerabilities send firmware devs across an entire ecosystem scrambling

PixieFail is a huge deal for cloud and data centers. For the rest, less so. Enlarge (credit: Nadezhda Kozhedub) UEFI firmware from five of the leading suppliers contains vulnerabilities that allow attackers with a toehol.....»»

Category: topSource:  arstechnicaRelated NewsJan 17th, 2024

1,700 Ivanti VPN devices compromised. Are yours among them?

Over 1,700 Ivanti Connect Secure VPN devices worldwide have been compromised by attackers exploiting two zero-days with no patches currently available. “Additional threat actors beyond UTA0178 appear to now have access to the exploit and are ac.....»»

Category: securitySource:  netsecurityRelated NewsJan 16th, 2024

Week in review: GitLab account takeover flaw, attackers exploiting Ivanti Connect Secure zero-days

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Social engineer reveals effective tricks for real-world intrusions In this Help Net Security interview, Jayson E. Street, Chief Adversarial Officer.....»»

Category: securitySource:  netsecurityRelated NewsJan 14th, 2024

Akira ransomware attackers are wiping NAS and tape backups

“The Akira ransomware malware, which was first detected in Finland in June 2023, has been particularly active at the end of the year,” the Finnish National Cybersecurity Center (NCSC-FI) has shared on Wednesday. NCSC-FI has received 12 re.....»»

Category: securitySource:  netsecurityRelated NewsJan 12th, 2024

Critical GitLab flaw allows account takeover without user interaction, patch quickly! (CVE-2023-7028)

A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords. While also vulnerable, users who have two-factor authentication enabled on their account are safe from account takeo.....»»

Category: securitySource:  netsecurityRelated NewsJan 12th, 2024

Ivanti Connect Secure zero-days exploited by attackers (CVE-2023-46805, CVE-2024-21887)

Two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti Connect Secure VPN devices are under active exploitation by unknown attackers, Volexity researchers have discovered. Patches for these flaws are currently unavailable, but the ri.....»»

Category: securitySource:  netsecurityRelated NewsJan 11th, 2024

Critical Cisco Unity Connection flaw gives attackers root privileges. Patch now! (CVE-2024-20272)

Cisco has fixed a critical vulnerability (CVE-2024-20272) in Cisco Unity Connection that could allow an unauthenticated attacker to upload arbitrary files and gain root privilege on the affected system. Cisco Unity Connection is a unified messaging a.....»»

Category: securitySource:  netsecurityRelated NewsJan 11th, 2024

VicOne partners with BlackBerry to help detect cyberthreats to connected cars

VicOne announced a partnership with BlackBerry to strengthen the cybersecurity posture of the automotive ecosystem. By leveraging ML processing at the edge and cloud-controlled access to vehicle data, the partnership will enable car manufacturers and.....»»

Category: securitySource:  netsecurityRelated NewsJan 11th, 2024

Researchers look at thermal stabilization in photonic packages

Photonics offers various advantages, including enablement of high-speed and low-loss communication by leveraging light properties in optical data communication, biomedical applications, automotive technology, and artificial intelligence domains. Thes.....»»

Category: topSource:  physorgRelated NewsJan 10th, 2024

“Security researcher” offers to delete data stolen by ransomware attackers

When organizations get hit by ransomware and pay the crooks to decrypt the encrypted data and delete the stolen data, they can never be entirely sure the criminals will do as they promised. And even if an organization gets its data decrypted, they ca.....»»

Category: securitySource:  netsecurityRelated NewsJan 9th, 2024

Attackers could use vulnerabilities in Bosch Rexroth nutrunners to disrupt automotive production

Researchers have discovered over two dozen vulnerabilities in “smart” cordless nutrunners (i.e., pneumatic torque wrenches) manufactured by Bosch Rexroth that could be exploited to make the devices inoperable or their output unreliable. &.....»»

Category: securitySource:  netsecurityRelated NewsJan 9th, 2024

3 main tactics attackers use to bypass MFA

Notable security breaches have bypassed MFA to compromise taxi broker Uber, games company EA, and authentication business Okta, according to SE Labs. CISOs must bolster MFA protections SE Labs advised CISOs to step-up their efforts against attacks on.....»»

Category: securitySource:  netsecurityRelated NewsDec 26th, 2023

8220 gang exploits old Oracle WebLogic vulnerability to deliver infostealers, cryptominers

The 8220 gang has been leveraging an old Oracle WebLogic Server vulnerability (CVE-2020-14883) to distribute malware, the Imperva Threat Research team has found. About 8220 Active since 2017, the 8220 gang has been known for deploying cryptocurrency.....»»

Category: securitySource:  netsecurityRelated NewsDec 20th, 2023

Insights from the Global Wheat Challenge on deep learning and dataset diversity

Crowdsourcing has become pivotal in scientific research, particularly in data-intensive fields like plant phenotyping, leveraging platforms like Kaggle for data analysis and machine learning challenges......»»

Category: topSource:  physorgRelated NewsDec 18th, 2023

MongoDB corporate systems breached, customer data exposed

Database management company MongoDB has suffered a breach: attackers have gained access to some of its corporate systems and customer data and metadata. The MongoDB breach “We detected suspicious activity on Wednesday (Dec. 13th, 2023) evening.....»»

Category: securitySource:  netsecurityRelated NewsDec 18th, 2023

CIOs shape long-term success with GenAI expertise

Today’s CIOs have evolved from managing IT infrastructure and ensuring systems’ efficiency to becoming key business strategists, according to IDC. They stand at the intersection of technology and business, leveraging innovations to shape.....»»

Category: securitySource:  netsecurityRelated NewsDec 15th, 2023

Attackers are trying to exploit Apache Struts vulnerability (CVE-2023-50164)

Attackers are trying to leverage public proof-of-exploit (PoC) exploit code for CVE-2023-50164, the recently patched path traversal vulnerability in Apache Struts 2. “Attackers aim to deploy webshells, with some cases targeting the parameter &#.....»»

Category: securitySource:  netsecurityRelated NewsDec 14th, 2023

Attackers abuse OAuth apps to initiate large-scale cryptomining and spam campaigns

Attackers are compromising high-privilege Microsoft accounts and abusing OAuth applications to launch a variety of financially-motivated attacks. Abusing OAuth applications OAuth is an open standard authentication protocol that uses tokens to grant a.....»»

Category: securitySource:  netsecurityRelated NewsDec 13th, 2023