Advertisements


Looney Tunables bug exploited for cryptojacking

Kinsing threat actors have been spotted exploiting the recently disclosed Looney Tunables (CVE-2023-4911) vulnerability to covertly install cryptomining software into cloud-native environments. Kinsing (aka Money Libra) is a threat actor group that h.....»»

Category: securitySource:  netsecurityNov 7th, 2023

Critical GitLab flaw allows account takeover without user interaction, patch quickly! (CVE-2023-7028)

A critical vulnerability in GitLab CE/EE (CVE-2023-7028) can be easily exploited by attackers to reset GitLab user account passwords. While also vulnerable, users who have two-factor authentication enabled on their account are safe from account takeo.....»»

Category: securitySource:  netsecurityRelated NewsJan 12th, 2024

Ivanti Connect Secure zero-days exploited by attackers (CVE-2023-46805, CVE-2024-21887)

Two zero-day vulnerabilities (CVE-2023-46805, CVE-2024-21887) in Ivanti Connect Secure VPN devices are under active exploitation by unknown attackers, Volexity researchers have discovered. Patches for these flaws are currently unavailable, but the ri.....»»

Category: securitySource:  netsecurityRelated NewsJan 11th, 2024

Actively exploited 0-days in Ivanti VPN are letting hackers backdoor networks

Organizations using Ivanti Connect Secure should take action at once. Enlarge (credit: Getty Images) Unknown threat actors are actively targeting two critical zero-day vulnerabilities that allow them to bypass two-factor.....»»

Category: topSource:  arstechnicaRelated NewsJan 11th, 2024

Attackers could use vulnerabilities in Bosch Rexroth nutrunners to disrupt automotive production

Researchers have discovered over two dozen vulnerabilities in “smart” cordless nutrunners (i.e., pneumatic torque wrenches) manufactured by Bosch Rexroth that could be exploited to make the devices inoperable or their output unreliable. &.....»»

Category: securitySource:  netsecurityRelated NewsJan 9th, 2024

Hackers can infect network-connected wrenches to install ransomware

Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»

Category: topSource:  pcmagRelated NewsJan 9th, 2024

Network-connected wrenches in factories can be hacked for sabotage or ransomware

Researchers identify 23 vulnerabilities, some of which can exploited with no authentication. Enlarge / The Rexroth Nutrunner, a line of torque wrench sold by Bosch Rexroth. (credit: Bosch Rexroth) Researchers have uneart.....»»

Category: topSource:  theglobeandmailRelated NewsJan 9th, 2024

Escalating cyber threats: Bots, fraud farms, and cryptojacking surge, urgently requiring attention

The motivations behind cyberattacks are as diverse as the methods employed. Whether driven by financial gain, political agendas, or sheer malice, cybercriminals exploit weaknesses in cybersecurity defenses, seeking entry points to compromise sensitiv.....»»

Category: securitySource:  netsecurityRelated NewsJan 5th, 2024

Millions still haven’t patched Terrapin SSH protocol vulnerability

Terrapin isn't likely to be mass-exploited, but there's little reason not to patch. Enlarge (credit: Getty Images) Roughly 11 million Internet-exposed servers remain susceptible to a recently discovered vulnerability tha.....»»

Category: topSource:  arstechnicaRelated NewsJan 4th, 2024

Barracuda fixes new ESG zero-day exploited by Chinese hackers

Reported Chinese cybercriminals uncover zero-days in Barracuda ESGs, and utilize flaws in cyberattacks......»»

Category: topSource:  informationweekRelated NewsDec 29th, 2023

EOL Sophos firewalls get hotfix for old but still exploited vulnerability (CVE-2022-3236)

Over a year has passed since Sophos delivered patches for a vulnerability affecting Sophos Firewalls (CVE-2022-3236) that was being actively exploited by attackers, and now they have pushed additional ones to protect vulnerable EOL devices. “In.....»»

Category: securitySource:  netsecurityRelated NewsDec 13th, 2023

Atlassian fixes four critical RCE vulnerabilities, patch quickly!

Atlassian has released security updates for four critical vulnerabilities (CVE-2023-1471, CVE-2023-22522, CVE-2023-22524, CVE-2023-22523) in its various offerings that could be exploited to execute arbitrary code. About the vulnerabilities CVE-2022-1.....»»

Category: securitySource:  netsecurityRelated NewsDec 6th, 2023

Critical Zyxel NAS vulnerabilities patched, update quickly!

Zyxel has patched six vulnerabilities affecting its network attached storage (NAS) devices, including several (OS) command injection flaws that can be easily exploited by unauthenticated attackers. The vulnerabilities in Zyxel NAS devices One of the.....»»

Category: securitySource:  netsecurityRelated NewsDec 1st, 2023

Qlik Sense flaws exploited in Cactus ransomware campaign

Attackers are exploiting three critical vulnerabilities in internet-facing Qlik Sense instances to deliver Cactus ransomware to target organizations, Arctic Wolf researchers have warned. The exploited vulnerabilities Qlik Sense is a business intellig.....»»

Category: securitySource:  netsecurityRelated NewsDec 1st, 2023

Apple patches two zero-days used to target iOS users (CVE-2023-42916 CVE-2023-42917)

With the latest round of security updates, Apple has fixed two zero-day WebKit vulnerabilities (CVE-2023-42916, CVE-2023-42917) that “may have been exploited against versions of iOS before iOS 16.7.1.” About the vulnerabilities (CVE-2023-.....»»

Category: securitySource:  netsecurityRelated NewsDec 1st, 2023

iOS 17.1.2 and macOS Sonoma 14.1.2 patch 2 actively exploited vulnerabilities

Apple released an important security update today for iPhone, iPad, and Mac. The list of fixes is short, but iOS 17.1.2 and macOS Sonoma 14.1.2 patch two web-based security flaws that have been actively exploited. more….....»»

Category: topSource:  theglobeandmailRelated NewsNov 30th, 2023

iOS 17.1.2 & Sonoma 14.1.2 updates stop browsers from leaking personal data

Apple has updated iOS, iPadOS, and macOS Sonoma with new updates that fix two actively exploited WebKit bugs that could leak personal data to attackers.Apple patches flaws in WebKit in latest OS updatesThe company released the newest versions of its.....»»

Category: appleSource:  appleinsiderRelated NewsNov 30th, 2023

PSA: Update Chrome on Mac, as security flaw is being actively exploited

If you use Chrome on Mac, it’s strongly recommended to update it immediately, as a security flaw discovered by Google is being actively exploited by attackers. It could potentially allow personal data to be extracted from your Mac (the same issue a.....»»

Category: topSource:  informationweekRelated NewsNov 30th, 2023

Google fixes Chrome zero day exploited in the wild (CVE-2023-6345)

Google has released an urgent security update to fix a number of vulnerabilities in Chrome browser, including a zero-day vulnerability (CVE-2023-6345) that is being actively exploited in the wild. About CVE-2023-6345 CVE-2023-6345, reported by Benoî.....»»

Category: securitySource:  netsecurityRelated NewsNov 29th, 2023

Week in review: LockBit exploits Citrix Bleed, Apache ActiveMQ bug exploited for cryptojacking

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: PolarDNS: Open-source DNS server tailored for security evaluations PolarDNS is a specialized authoritative DNS server that allows the operator to pr.....»»

Category: securitySource:  netsecurityRelated NewsNov 26th, 2023

How LockBit used Citrix Bleed to breach Boeing and other targets

CVE-2023-4966, aka “Citrix Bleed”, has been exploited by LockBit 3.0 affiliates to breach Boeing’s parts and distribution business, and “other trusted third parties have observed similar activity impacting their organization,&.....»»

Category: securitySource:  netsecurityRelated NewsNov 22nd, 2023