|
2025-02-10 Abandoned AWS S3 Buckets Pose Major Cybersecurity RiskNeed some FUD to illustrate the hidden dangers of abandoned cloud resources and the potential for supply chain attacks? This article is for you! |
|
|
Recent research reveals that abandoned AWS S3 buckets pose a significant cybersecurity risk, as malicious actors can re-register these unused storage resources under their original names to execute attacks, such as delivering malware through software updates. The study identified 150 neglected S3 buckets previously used by major organizations for software deployment and other purposes. When researchers registered these buckets, they received 8 million file requests in two months from various high-profile entities, indicating the potential for malicious exploitation. Although AWS intervened to mitigate the specific risks, the underlying issue persists, emphasizing the need for organizations to manage cloud resources diligently and understand the permanence of references in deployment code. |
Risks: Shadow IT/Exposed Assets, Supply Chain, Malware CVEs: N/A |
|
Keywords: AWS S3, cloud storage, supply chain attack, abandoned buckets, malware delivery Affected: AWS S3, US government agencies, UK government agencies, Australian government agencies, Fortune 100 companies, a major payment card network, an industrial product company, global banks, regional banks, cybersecurity companies |
|
| Read More | |
|
2025-02-08 Critical Flaw in Veeam Backup Software Allows Code ExecutionNeed some ammo against AWS, Google Cloud, or Microsoft Azure? Have a customer or prospect that uses these platforms? This article is for you! |
|
|
A critical vulnerability in Veeam's Backup software, affecting several cloud platforms including AWS, Google Cloud, and Microsoft Azure, allows for arbitrary code execution via a man-in-the-middle attack. Veeam has released patches to address this issue, emphasizing that deployments not involving certain cloud environments remain unaffected. |
Risks: Patch Management, Cloud Service Provider Flaw CVEs: CVE-2025-23114 |
|
Keywords: Veeam, Backup, Vulnerability, Code Execution, Cloud Platforms, Patches Affected: Veeam Backup for Salesforce, Veeam Backup for Nutanix AHV, Veeam Backup for AWS, Veeam Backup for Microsoft Azure, Veeam Backup for Google Cloud, Veeam Backup for Oracle Linux Virtualization Manager, Veeam Backup for Red Hat Virtualization |
|
| Read More | |
|
2025-02-08 Cisco Patches Critical ISE Vulnerabilities Allowing Root AccessNeed some ammo against Cisco? This article is for you! |
|
|
Cisco has released patches for two critical vulnerabilities in its Identity Services Engine (ISE) that could allow remote attackers to execute arbitrary commands and elevate privileges. These flaws include an insecure Java deserialization vulnerability and an authorization bypass, which could be exploited by sending crafted requests to the API. Both vulnerabilities require patching, as there are no other workarounds, and while there is no evidence of exploitation, keeping systems updated is advised. |
Risks: Privilege Escalation, API Vulnerability CVEs: CVE-2025-20124; CVE-2025-20125 |
|
Keywords: Cisco, Identity Services Engine, ISE, Vulnerabilities, CVE-2025-20124, CVE-2025-20125, Root Access, Privilege Escalation Affected: Cisco Identity Services Engine |
|
| Read More | |
|
2025-02-08 ASP.NET Machine Keys Vulnerability Enables Remote Code ExecutionLearn about the risks of using insecure ASP.NET machine keys and how CloudGuard can help secure web server environments against such vulnerabilities. |
|
|
Microsoft has identified a security risk where developers are using publicly disclosed ASP.NET machine keys, making web servers vulnerable to remote code execution. Threat actors exploit this by crafting malicious ViewState objects using these keys, which are then sent to targeted websites to gain control via code injection. The issue is widespread, with over 3,000 keys publicly accessible, facilitating easier exploitation. |
Risks: Web App/Website Vulnerability, Hardcoded Secrets, Shadow IT/Exposed Assets CVEs: N/A |
|
Keywords: ASP.NET, machine keys, remote code execution, ViewState, web server security, Microsoft warning Affected: ASP.NET, Web servers |
|
| Read More | |
|
2025-02-08 Malicious Machine Learning Models on Hugging Face Evade DetectionGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
Cybersecurity researchers discovered two malicious machine learning models on Hugging Face that use a "broken" pickle format to evade detection by security tools. These models, likely proof-of-concept rather than active threats, contain platform-aware reverse shells that connect to a hard-coded IP address. The malicious content is embedded at the start of the PyTorch archives, which are compressed using the 7z format, allowing them to bypass detection by Picklescan, Hugging Face's security tool. The serialization breaks after the payload is executed, but the models can still execute the malicious code due to discrepancies in how deserialization and scanning are performed. This vulnerability has been addressed by updating the Picklescan utility. |
Risks: Supply Chain, Open Source, Malware CVEs: N/A |
|
Keywords: Hugging Face, machine learning, pickle files, PyTorch, supply chain attack, nullifAI Affected: Hugging Face, PyTorch, Picklescan |
|
| Read More | |
|
2025-02-08 CISA Adds Four Actively Exploited Vulnerabilities to CatalogLearn about the critical importance of timely patch management to protect against vulnerabilities actively exploited in the wild. |
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added four vulnerabilities to its Known Exploited Vulnerabilities catalog, highlighting their active exploitation. These include a forced browsing flaw in Apache OFBiz, an information disclosure issue in Microsoft .NET Framework, and two vulnerabilities in Paessler PRTG Network Monitor related to command injection and local file inclusion. Patches for these vulnerabilities were released between 2018 and 2024. |
Risks: Patch Management, Web App/Website Vulnerability CVEs: CVE-2024-45195; CVE-2024-29059; CVE-2018-9276; CVE-2018-19410 |
|
Keywords: CISA, Known Exploited Vulnerabilities, Apache OFBiz, Microsoft .NET Framework, Paessler PRTG, Patch Management Affected: Apache OFBiz, Microsoft .NET Framework, Paessler PRTG Network Monitor |
|
| Read More | |
|
2025-02-07 Microsoft Patches Critical Vulnerabilities in Azure AI Face Service and Microsoft AccountNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure AI? This article is for you! |
|
|
Microsoft has released patches for two critical security vulnerabilities affecting Azure AI Face Service and Microsoft Account, which could allow privilege escalation. The Azure AI Face Service vulnerability, with a CVSS score of 9.9, involves an authentication bypass that could enable privilege elevation, while the Microsoft Account vulnerability involves missing authorization. Both vulnerabilities have been mitigated, and no action is required from customers. |
Risks: Privilege Escalation, Cloud Service Provider Flaw CVEs: CVE-2025-21396; CVE-2025-21415 |
|
Keywords: Microsoft Azure, Azure AI Face Service, CVE-2025-21415, CVE-2025-21396, Privilege Escalation, Security Patches Affected: Azure AI Face Service, Microsoft Account |
|
| Read More | |
|
2025-02-07 2024 Sees 20% Rise in Exploited VulnerabilitiesLearn about the increasing threat landscape and the importance of proactive vulnerability management to protect against sophisticated exploits. |
|
|
The VulnCheck report for 2024 highlights a 20% increase in exploited vulnerabilities compared to 2023, with 768 CVEs reported as actively exploited. Notably, 23.6% of these vulnerabilities were weaponized by threat actors on or before their public disclosure. The report also links 15 Chinese hacking groups to the exploitation of frequently targeted vulnerabilities, affecting approximately 400,000 internet-accessible systems across various products from companies like Apache, Atlassian, Cisco, and Microsoft. |
Risks: Patch Management, Web App/Website Vulnerability, Other: CVE Exploitation CVEs: N/A |
|
Keywords: VulnCheck, CVEs 2024, Exploited Vulnerabilities, Threat Actors, Apache, Microsoft, Chinese Hacking Groups Affected: Apache, Atlassian, Barracuda, Citrix, Cisco, Fortinet, Microsoft, Progress, PaperCut, Zoho |
|
| Read More | |
|
2025-02-06 IMI Hit by Cyber Attack Affecting Global SystemsLearn about the growing threat landscape affecting engineering firms and other industries—perfect for showcasing the importance of robust cloud security solutions like CloudGuard. |
|
|
Engineering group IMI has suffered a cyber attack, affecting its systems worldwide and leading to a 3% drop in its share price. The firm, which operates in 50 countries, has isolated impacted systems and is collaborating with external cybersecurity experts to investigate and contain the breach. While the specific data accessed remains undisclosed, the attack does not appear to have targeted employee or customer information. This incident follows a similar attack on Smiths Group, although the two are not believed to be linked. Recent cyber attacks have also affected other UK entities, including Transport for London and Harvey Nichols. |
Risks: N/A CVEs: N/A |
|
Keywords: IMI, Smiths Group, Cyber Attack, UK Engineering, Global Systems, Data Breach, Cloud Security Affected: IMI, Smiths Group, Transport for London, Harvey Nichols, Portsmouth City Council |
|
| Read More | |
|
2025-02-02 BeyondTrust Breach Exposes SaaS Customers via Compromised API KeyLearn about the critical need for robust API security and the potential vulnerabilities in Remote Support SaaS solutions. |
|
|
BeyondTrust experienced a cybersecurity breach affecting 17 Remote Support SaaS customers due to a compromised API key, which was exploited through a zero-day vulnerability in a third-party application. This allowed unauthorized access by resetting local application passwords. The breach was first detected in December 2024. Although the compromised API key has been revoked and affected customer instances suspended, the U.S. Treasury Department was among those impacted. The attack has been linked to the China-affiliated hacking group Silk Typhoon. BeyondTrust identified two separate vulnerabilities in its products, which have been added to CISA's Known Exploited Vulnerabilities catalog. |
Risks: Zero-Day, API Vulnerability, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: CVE-2024-12356; CVE-2024-12686 |
|
Keywords: BeyondTrust, API Key Breach, Zero-Day Vulnerability, Silk Typhoon, Remote Support SaaS Affected: BeyondTrust Remote Support SaaS, AWS, U.S. Treasury Department |
|
| Read More | |
|
2025-01-30 Critical Vulnerability in Cacti Allows Remote Code ExecutionLearn about the critical importance of patch management to prevent remote code execution and data compromise in network monitoring tools. |
|
|
A critical vulnerability in Cacti, an open-source network monitoring tool, allows authenticated users to execute remote code on affected systems by exploiting a flaw in the SNMP result parser. This vulnerability, identified as CVE-2025-22604, has a high severity score and permits attackers with management permissions to manipulate sensitive data. The issue, alongside another vulnerability (CVE-2025-24367), has been fixed in Cacti version 1.2.29. Organizations using Cacti should prioritize patching to prevent potential exploitation. |
Risks: Patch Management, Web App/Website Vulnerability, Open Source CVEs: CVE-2025-22604; CVE-2025-24367 |
|
Keywords: Cacti, CVE-2025-22604, Remote Code Execution, Network Monitoring, SNMP Vulnerability Affected: Cacti |
|
| Read More | |
|
2025-01-30 Unpatched Vulnerabilities in Voyager Allow Remote Code ExecutionLearn about the importance of securing open-source admin tools and the potential risks of unpatched vulnerabilities. |
|
|
The open-source Laravel admin package Voyager has three unpatched vulnerabilities that could lead to remote code execution attacks when an authenticated user clicks on a malicious link. These vulnerabilities include bypassing MIME-type verification to upload malicious files, improper input sanitization allowing JavaScript injection, and file management flaws enabling unauthorized file manipulation. Despite attempts to notify the maintainers, the issues remain unresolved. Voyager users, primarily Laravel developers and small businesses, are advised to restrict access to trusted users, use role-based access control, and implement server-level security measures to mitigate risk. |
Risks: Open Source, Web App/Website Vulnerability, Patch Management, Privilege Escalation |
|
Keywords: Voyager, Laravel, Remote Code Execution, CVE-2024-55417, Open Source Vulnerability Affected: Voyager |
|
| Read More | |
|
2025-01-29 Critical Vulnerabilities Grant Access to 3,000 CompaniesLearn about the critical importance of secure coding practices and how they can prevent massive breaches, providing you with valuable insights to discuss with prospects. |
|
|
Cybersecurity researchers exploited critical vulnerabilities in a company's infrastructure, gaining control over a super admin panel and access to over 3,000 companies. These vulnerabilities included improper API authentication, inadequate KYC checks, and flawed backend authorization, which were uncovered by manipulating API endpoints and bypassing security measures like a Web Application Firewall. The findings highlight the severe risks associated with weak secure coding practices. |
Risks: API Vulnerability, Web App/Website Vulnerability, Privilege Escalation CVEs: N/A |
|
Keywords: API security, secure coding, vulnerability exploitation, backend authorization, Web Application Firewall bypass Affected: N/A |
|
| Read More | |
|
2025-01-29 High-Severity SQL Injection Vulnerability in VMware Avi Load BalancerLearn about the critical importance of timely patch management to protect against high-severity vulnerabilities in key infrastructure components like VMware Avi Load Balancer. |
|
|
Broadcom has identified a high-severity SQL injection vulnerability in VMware Avi Load Balancer that allows unauthorized users with network access to execute specially crafted SQL queries to gain database access. Affected versions include 30.1.1, 30.1.2, 30.2.1, and 30.2.2, and users are advised to update to the latest patched versions as there are no workarounds available. |
Risks: Patch Management, Web App/Website Vulnerability CVEs: CVE-2025-22217 |
|
Keywords: VMware Avi Load Balancer, SQL Injection, CVE-2025-22217, Patch Management, Broadcom Affected: VMware Avi Load Balancer |
|
| Read More | |
|
2025-01-28 IBM Security Directory Integrator Vulnerabilities Expose Sensitive DataLearn about the crucial importance of secure cookie handling and data protection to emphasize the need for comprehensive security solutions. |
|
|
IBM has addressed multiple vulnerabilities in its Security Directory Integrator product, which could allow attackers to steal session cookies and access sensitive information. These vulnerabilities involve improper handling of authorization tokens and session cookies, with two having a medium severity and one rated as low severity. The issues primarily affect confidentiality by exposing cookies via unsecured HTTP connections and disclosing sensitive directory information. Although the vulnerabilities are less likely to impact system integrity and availability, they underscore the importance of securing sensitive data against unauthorized access. |
Risks: Sensitive Data, Patch Management, Web App/Website Vulnerability |
|
Keywords: IBM, Security Directory Integrator, vulnerabilities, session cookies, data exposure, CVE Affected: IBM Security Directory Integrator |
|
| Read More | |
|
2025-01-28 Intel TDX Vulnerability Exposes Cloud Environments to Security RisksLearn how vulnerabilities in Intel's TDX can expose cloud environments to risk and see why robust virtualization security is crucial for protecting sensitive data. |
|
|
Researchers have identified critical security vulnerabilities in Intel Trust Domain Extensions (TDX), which are designed to provide secure isolation for virtual machines by protecting sensitive data from potentially compromised Virtual Machine Managers (VMMs). Despite TDX's advanced security features, such as Multi-Key Total Memory Encryption (MKTME) and remote attestation, the study highlights weaknesses in its core isolation mechanisms. These vulnerabilities allow side-channel attacks through shared system resources and hardware performance counters, enabling a VMM to observe and exploit performance metrics. This compromises the integrity of TDX, posing significant risks to cloud computing and virtualized environments where TDX is used to secure multi-tenant workloads. |
Risks: Sensitive Data, Side-Channel Attacks, Other: Resource Contention CVEs: N/A |
|
Keywords: Intel TDX, Virtual Machine Security, Cloud Vulnerability, Side-Channel Attacks, Multi-Tenant Security Affected: Intel Trust Domain Extensions, Virtual Machine Managers, Cloud Computing Environments |
|
| Read More | |
|
2025-01-27 Meta Llama Framework Vulnerability Allows Remote Code ExecutionLearn about the risks of unpatched AI frameworks and how CloudGuard can help protect against remote code execution vulnerabilities. |
|
|
A vulnerability in Meta's Llama large language model framework could allow attackers to execute arbitrary code on the inference server by exploiting a flaw in the deserialization process. This issue affects the Llama Stack component, specifically the reference Python Inference API implementation, which uses the unsafe pickle library to deserialize data. If the ZeroMQ socket is exposed, attackers could send malicious objects to execute code on the host machine. |
Risks: API Vulnerability, Open Source, Other: Remote Code Execution CVEs: CVE-2024-50050 |
|
Keywords: Meta, Llama, Remote Code Execution, Vulnerability, AI Security, CVE-2024-50050 Affected: Meta, Llama, Llama Stack, Python Inference API, ZeroMQ |
|
| Read More | |
|
2025-01-24 Juniper Routers Exploited by Custom Backdoor in J-magic CampaignLearn about the risks facing edge infrastructure and the opportunity to offer advanced security solutions for sectors like IT, energy, and manufacturing. |
|
|
The J-magic campaign involves a custom backdoor exploiting a "magic packet" vulnerability in Juniper Networks routers running Junos OS. The malware, based on an old backdoor called cd00r, targets sectors like semiconductor, energy, manufacturing, and IT across multiple countries. The backdoor waits for specific packets to establish a reverse shell, allowing attackers to control devices, steal data, or deploy further payloads. The campaign highlights vulnerabilities in edge infrastructure, particularly routers lacking endpoint detection and response protections. |
Risks: Malware, Shadow IT/Exposed Assets CVEs: N/A |
|
Keywords: Juniper Networks, magic packet, backdoor, J-magic campaign, Junos OS, cd00r, SEASPY, edge infrastructure Affected: Juniper Networks routers, Junos OS, semiconductor industry, energy industry, manufacturing industry, information technology sector, Barracuda Email Security Gateway appliances |
|
| Read More | |
|
2025-01-24 Palo Alto Networks Firewalls Vulnerable to Firmware ExploitsNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
An evaluation of Palo Alto Networks' firewall models revealed multiple known vulnerabilities in the firmware, potentially allowing attackers to bypass Secure Boot and modify device firmware. The vulnerabilities, collectively termed PANdora's Box, include issues like BootHole, LogoFAIL, PixieFail, and others affecting models PA-3260, PA-1410, and PA-415. These findings highlight the necessity for organizations to adopt comprehensive supply chain security measures, including vendor assessments, firmware updates, and device integrity monitoring. Palo Alto Networks asserts that their current PAN-OS software, when configured correctly, mitigates these risks and that they are unaware of any active exploitation of these vulnerabilities. |
Risks: Privilege Escalation, Misconfiguration, Supply Chain CVEs: CVE-2020-10713; CVE-2022-24030; CVE-2021-33627; CVE-2021-42060; CVE-2021-42554; CVE-2021-43323; CVE-2021-45970; CVE-2023-1017 |
|
Keywords: Palo Alto Networks, firewall vulnerabilities, Secure Boot bypass, firmware exploits, PANdora's Box Affected: Palo Alto Networks, PA-3260, PA-1410, PA-415 |
|
| Read More | |
|
2025-01-24 jQuery XSS Vulnerability Actively Exploited Despite PatchLearn about the importance of patch management and how vulnerabilities in widely used libraries like jQuery can impact security. |
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a cross-site scripting (XSS) vulnerability in the jQuery library to its list of known exploited vulnerabilities. Although this medium-severity flaw, which could allow arbitrary code execution, was patched in jQuery version 3.5.0 in April 2020, it continues to be exploited. The flaw can occur when HTML containing |
Risks: Patch Management, Web App/Website Vulnerability, Open Source CVEs: CVE-2020-11023 |
|
Keywords: jQuery, XSS vulnerability, CISA, CVE-2020-11023, DOM manipulation, patch management Affected: jQuery |
|
| Read More | |
|
2025-01-24 Next.js Vulnerabilities Expose Websites to Cache Poisoning and XSS AttacksWant to show the importance of securing popular frameworks and the risks of improper caching? This article on Next.js vulnerabilities is a must-read! |
|
|
Recent research has identified critical vulnerabilities in the Next.js framework, specifically between versions 13.5.1 and 14.2.9, which expose websites to cache poisoning and stored cross-site scripting (XSS) attacks. These vulnerabilities stem from improper caching mechanisms, allowing attackers to manipulate data-fetching routes and request details, resulting in corrupted content delivery and execution of malicious scripts. The issues affect static-route deployments on non-Vercel-hosted sites, necessitating an upgrade to version 14.2.10 or later. Organizations using Next.js must apply patches promptly, modify cache keys, and review their code to safeguard against these threats, given the framework's extensive use and potential impact on user privacy and service availability. |
Risks: Misconfiguration, Web App/Website Vulnerability, Open Source CVEs: CVE-2024-46982 |
|
Keywords: Next.js, Cache Poisoning, Stored XSS, CVE-2024-46982, JavaScript Vulnerability, Web Security Affected: Next.js |
|
| Read More | |
|
2025-01-23 Unauthorized Encryption Threats Target AWS S3 BucketsNeed some ammo against AWS? Have a customer or prospect that uses AWS? This article is for you! |
|
|
AWS has detected an increase in unauthorized encryption activities targeting S3 buckets, where threat actors use compromised credentials to exploit server-side encryption with client-provided keys. Although no AWS service vulnerabilities are identified, the misuse of valid credentials poses data protection risks by overwriting and re-encrypting customer data. AWS advises eliminating long-term access credentials, establishing data recovery procedures, monitoring access for anomalies, and blocking unnecessary SSE-C usage as key security practices to mitigate these threats. AWS has also implemented automatic security measures to block many unauthorized activities, highlighting the importance of customer vigilance. |
Risks: Weak or Compromised Credentials, Sensitive Data CVEs: N/A |
|
Keywords: AWS, S3 Buckets, Unauthorized Encryption, Cloud Security, Data Protection Affected: AWS |
|
| Read More | |
|
2025-01-23 Critical Vulnerabilities in WordPress RealHome and Easy Real Estate PluginsLearn about the risks of unpatched vulnerabilities in popular WordPress themes and plugins, and how CloudGuard can help protect against privilege escalation attacks. |
|
|
Two critical vulnerabilities affecting the RealHome theme and Easy Real Estate plugins for WordPress allow unauthenticated users to gain administrative privileges. Despite being identified in September 2024, these issues remain unpatched by the vendor, InspiryThemes. The RealHome theme's flaw enables attackers to register as administrators through a registration function without proper authorization checks, while the Easy Real Estate plugin allows privilege escalation via its social login feature. Both vulnerabilities pose significant security risks to websites using these popular real estate solutions. |
Risks: Zero-Day, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-32444; CVE-2024-32555 |
|
Keywords: WordPress, RealHome, Easy Real Estate, privilege escalation, CVE-2024-32444, CVE-2024-32555 Affected: RealHome theme, Easy Real Estate plugin, WordPress |
|
| Read More | |
|
2025-01-23 Ivanti Cloud Services Targeted by Nation-State Exploit ChainsUnderstand the critical vulnerabilities in cloud service applications and emphasize the importance of proactive security measures to protect against nation-state attacks. |
|
|
The U.S. government agencies CISA and FBI have provided technical details on two exploit chains used by nation-state hackers to compromise Ivanti's cloud service applications. These exploits, identified in September 2024, involve vulnerabilities that allow administrative bypass, SQL injection, and remote code execution. The exploit chains enable attackers to gain initial access, execute remote code, obtain credentials, and attempt to implant web shells on target networks. The vulnerabilities have been used to conduct lateral movements and compromise sensitive data stored within Ivanti appliances. |
Risks: Sensitive Data, Patch Management, Web App/Website Vulnerability, Weak or Compromised Credentials CVEs: CVE-2024-8963; CVE-2024-9379; CVE-2024-8190; CVE-2024-9380 |
|
Keywords: Ivanti, Nation-State Attack, Cloud Vulnerabilities, Remote Code Execution, CISA, FBI Affected: Ivanti |
|
| Read More | |
|
2025-01-23 Azure DevOps Vulnerabilities Enable CRLF Injection and DNS Rebinding AttacksNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure DevOps? This article is for you! |
|
|
The article discusses several vulnerabilities discovered in Azure DevOps, including CRLF injection and DNS rebinding attacks, which present serious security risks. The vulnerabilities allow attackers to conduct Server-Side Request Forgery (SSRF) and manipulate DNS records, potentially exposing sensitive internal services and data. Exploitation of these flaws can lead to unauthorized access, data leakage, and further attacks like cross-site scripting (XSS). To mitigate these risks, Azure DevOps users are advised to apply security patches, strengthen authentication, audit access controls, and monitor network activities. |
Risks: API Vulnerability, Cloud Service Provider Flaw CVEs: N/A |
|
Keywords: Azure DevOps, SSRF, CRLF Injection, DNS Rebinding, Cloud Security, Vulnerability Affected: Azure DevOps, Azure Active Directory |
|
| Read More | |
|
2025-01-23 Cisco Patches ClamAV DoS Vulnerability and Other Critical FlawsNeed some ammo against Cisco? This article highlights vulnerabilities in their software, offering an opportunity to showcase CloudGuard's superior security capabilities. |
|
|
Cisco has issued security updates to address a denial-of-service (DoS) vulnerability in ClamAV, caused by a heap-based buffer overflow in the OLE2 decryption routine. This flaw allows remote attackers to crash the ClamAV antivirus scanning process by submitting a crafted file, affecting Secure Endpoint Connector software across multiple platforms. Although there is no evidence of active exploitation, proof-of-concept exploit code is available. Cisco also patched additional vulnerabilities, including a DoS flaw in Cisco BroadWorks and a critical privilege escalation issue in Cisco Meeting Management REST API. |
Risks: Patch Management, Privilege Escalation, Open Source |
|
Keywords: Cisco, ClamAV, Denial of Service, CVE-2025-20128, Vulnerability Patch, Secure Endpoint Connector Affected: ClamAV, Secure Endpoint Connector software, Cisco BroadWorks, Cisco Meeting Management REST API |
|
| Read More | |
|
2025-01-22 TalkTalk Data Breach Exposes Information of 18 Million CustomersDiscover the critical importance of robust cybersecurity measures in the telecommunications industry and how CloudGuard can protect against massive data breaches like TalkTalk's. |
|
|
A significant data breach at TalkTalk has exposed sensitive information from over 18 million customers, with the data reportedly being sold on a Russian dark web forum. The breach includes personal details such as subscriber characteristics, contact numbers, email addresses, and IP addresses. The incident is one of the largest in recent years and highlights ongoing cybersecurity challenges in the telecommunications industry. TalkTalk is under pressure to address these allegations and implement measures to prevent further harm. |
Risks: Sensitive Data CVEs: N/A |
|
Keywords: TalkTalk, Data Breach, Telecommunications, Customer Data, Dark Web, Personal Information Exposure Affected: TalkTalk |
|
| Read More | |
|
2025-01-22 CISA and FBI Update Guidance on Risky Software Security PracticesLearn about the crucial importance of secure software development practices and how addressing risky practices can enhance your pitch for CloudGuard solutions in safeguarding critical infrastructure. |
|
|
The CISA and FBI have updated their guidance on risky software security practices, emphasizing the need for software manufacturers to prioritize security, especially for critical infrastructure. The guidance highlights practices like using memory-unsafe languages, default passwords, and components with known vulnerabilities, and stresses the importance of multi-factor authentication and timely publication of CVEs. New additions include avoiding hardcoded credentials, outdated cryptographic functions, and improving product support. The updates also provide more examples for preventing SQL and command injection vulnerabilities, with specific recommendations for operational technology products to support phishing-resistant MFA. This guidance aims to help software manufacturers, including those developing on-premises, cloud, and SaaS products, to improve security and signal commitment to customer security outcomes. |
Risks: Patch Management, Hardcoded Secrets, Weak or Compromised Credentials, Web App/Website Vulnerability CVEs: N/A |
|
Keywords: Software Security, CISA, FBI, Risky Practices, Multi-Factor Authentication, Cryptographic Functions, Critical Infrastructure Affected: N/A |
|
| Read More | |
|
2025-01-22 PowerSchool Data Breach Exposes Student and Educator InformationLearn about the consequences of data breaches in the education sector and the critical importance of securing customer support portals to protect sensitive information. |
|
|
In December 2024, PowerSchool, a major provider of education technology solutions, experienced a data breach affecting its Student Information System (SIS) environments. Compromised credentials were used to access the PowerSource customer support portal, leading to the export of sensitive data including personal information of students and educators. PowerSchool has indicated that the data has been deleted and will not be disseminated, hinting at a possible ransomware attack. The breach impacted numerous schools and districts globally, with significant effects in Virginia and California, among other regions. The company is offering two years of free identity theft and credit monitoring services to those affected. |
Risks: Sensitive Data, Weak or Compromised Credentials, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: PowerSchool, Data Breach, Student Information System, Ransomware, Education Technology, Identity Theft Affected: PowerSchool, Student Information System (SIS), PowerSource, K-12 education, Menlo Park City School District, Rancho Santa Fe School District, Toronto District School Board |
|
| Read More | |
|
2025-01-22 Oracle Releases January 2025 Patch Fixing 318 VulnerabilitiesLearn about the crucial importance of patch management and how staying updated can prevent severe security risks in enterprise environments. |
|
|
Oracle has issued its January 2025 Critical Patch Update addressing 318 security vulnerabilities across its product suite, including Oracle Agile Product Lifecycle Management (PLM) Framework, Oracle WebLogic Server, and JD Edwards EnterpriseOne Tools. The most critical flaw, with a CVSS score of 9.9, affects the Oracle Agile PLM Framework and could allow attackers to gain control via HTTP. Other significant vulnerabilities include those in JD Edwards EnterpriseOne Tools, Apache Xerces C++ XML parser, Apache ActiveMQ, and Oracle WebLogic Server. Oracle has also released 285 security patches for Oracle Linux. Users are encouraged to apply these updates promptly to mitigate security risks. |
Risks: Patch Management, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2025-21556; CVE-2024-21287; CVE-2025-21524; CVE-2023-3961; CVE-2024-23807; CVE-2023-46604; CVE-2024-45492; CVE-2024-56337; CVE-2025-21535; CVE-2016-1000027; CVE-2023-29824; CVE-2020-2883; CVE-2024-37371 |
|
Keywords: Oracle, Critical Patch Update, Vulnerabilities, Oracle Agile PLM, JD Edwards, WebLogic Server, Cyber Risk, Security Patches Affected: Oracle Agile Product Lifecycle Management Framework, JD Edwards EnterpriseOne Tools, Apache Xerces C++ XML parser, Apache ActiveMQ, Oracle Communications Diameter Signaling Router, Oracle Communications Network Analytics Data Director, Financial Services Behavior Detection Platform, Financial Services Trade-Based Anti Money Laundering Enterprise Edition, HTTP Server, Apache Tomcat server, Oracle Communications Policy Management, Oracle WebLogic Server, Oracle BI Publisher, Oracle Business Intelligence Enterprise Edition, Oracle Linux |
|
| Read More | |
|
2025-01-21 Vulnerabilities in Tunneling Protocols Expose Millions of Internet HostsLearn how to secure cloud environments and network infrastructure from tunneling protocol vulnerabilities to protect against anonymous attacks and unauthorized network access. |
|
|
Recent research has identified security vulnerabilities in several tunneling protocols that affect approximately 4.2 million internet hosts, including VPN servers and routers. These vulnerabilities arise from the lack of sender verification, allowing attackers to perform anonymous attacks and access networks by exploiting protocols such as IP6IP6, GRE6, 4in6, and 6in4 without proper authentication and encryption. The affected hosts, particularly in countries like China, France, Japan, the U.S., and Brazil, could be misused for creating one-way proxies and conducting denial-of-service attacks. Mitigation strategies include using IPSec or WireGuard for security, accepting packets only from trusted sources, implementing traffic filtering, deep packet inspection, and blocking unencrypted tunneling packets. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Other: Inadequate Authentication CVEs: CVE-2020-10136; CVE-2024-7595; CVE-2024-7596; CVE-2025-23018; CVE-2025-23019 |
|
Keywords: Tunneling Protocols, VPN Vulnerabilities, GRE, IP6IP6, DDoS Attacks, Network Security Affected: VPN servers, ISP home routers, core internet routers, mobile network gateways, content delivery network (CDN) nodes |
|
| Read More | |
|
2025-01-21 Malindo Air Targeted by BASHE Ransomware GroupNew opportunity - airlines and the aviation industry are under threat from ransomware attacks. Time to get out your rolodex. |
|
|
Malindo Air, a Malaysian airline, has been targeted by the BASHE Ransomware group, raising concerns over the security of its systems and customer data. The attackers claim to have accessed sensitive organizational information, although specific details remain undisclosed. This attack highlights the ongoing vulnerability of airlines to cyber threats, as Malindo Air had previously experienced a major data breach in 2019. The incident emphasizes the importance for companies, particularly in the aviation sector, to implement robust cybersecurity measures, conduct regular vulnerability assessments, and provide employee training to protect against such threats. |
Risks: Sensitive Data, Insider Threats CVEs: N/A |
|
Keywords: Malindo Air, BASHE Ransomware, Airline Cybersecurity, Data Breach, Aviation Industry Affected: Malindo Air, aviation industry |
|
| Read More | |
|
2025-01-21 Critical Vulnerability Found in Mongoose Library for MongoDBLearn about the critical risks in widely used open-source components and how CloudGuard can help secure application vulnerabilities. |
|
|
A critical vulnerability has been discovered in the Mongoose library, which is widely used for MongoDB database modeling in Node.js environments. The flaw involves improper handling of nested $where filters with the populate() method, allowing attackers to inject malicious queries, manipulate search results, and access sensitive data. With a CVSS score of 9.0, this vulnerability affects millions of applications across various industries. Organizations are advised to assess their applications and apply mitigations such as strict query validation, limiting database access, deploying web application firewalls, and auditing for vulnerabilities while awaiting a patch from the developers. |
Risks: Sensitive Data, Web App/Website Vulnerability, Open Source, Injection CVEs: CVE-2025-2306 |
|
Keywords: Mongoose, MongoDB, CVE-2025-2306, Node.js, Vulnerability, Data Breach, Database Security Affected: Mongoose, MongoDB, Node.js |
|
| Read More | |
|
2025-01-20 FCC Enforces Network Security for US Telecoms Amid Espionage ConcernsWant to highlight the critical need for robust network security and compliance? Learn how recent espionage incidents underscore the importance of securing telecommunications against foreign threats. |
|
|
The FCC has reinforced that US telecommunications carriers are legally required to secure their networks against unauthorized access, as mandated by the Communications Assistance for Law Enforcement Act (CALEA). This comes in response to Chinese espionage activities, notably the Salt Typhoon group, which compromised major telcos and accessed sensitive data. The FCC's recent ruling emphasizes the need for carriers to implement robust cybersecurity measures, including comprehensive risk management plans to identify and mitigate cyber threats. These measures aim to protect against foreign intelligence activities and ensure compliance with CALEA's security requirements. |
Risks: Sensitive Data, Third-Party Vendor/SaaS, Other: Surveillance System Exploitation CVEs: N/A |
|
Keywords: FCC, CALEA, Network Security, Telecommunications, Espionage, Salt Typhoon, Chinese Spies Affected: AT&T, Verizon, Federal networks |
|
| Read More | |
|
2025-01-20 Otelier Data Breach Exposes Hotel Guest Information via Amazon S3Learn about the critical role of credential security and cloud storage protection in preventing data breaches, and leverage this insight to highlight the importance of comprehensive cloud security solutions. |
|
|
Otelier, a hotel management platform, experienced a data breach when attackers accessed its Amazon S3 storage, stealing nearly eight terabytes of data, including personal and reservation details of hotel guests from brands like Marriott, Hilton, and Hyatt. The breach, which occurred from July to October 2024, was facilitated by stolen credentials obtained through malware, allowing attackers to access Atlassian servers and subsequently Otelier's S3 buckets. While passwords and billing information remained secure, the exposed data included guests' names, addresses, phone numbers, and email addresses. Otelier has since terminated unauthorized access, disabled affected accounts, and is enhancing its cybersecurity measures to prevent future incidents. |
Risks: Sensitive Data, Malware, Weak or Compromised Credentials, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: Otelier, Data Breach, Amazon S3, Credential Theft, Hotel Industry Affected: Amazon S3, Atlassian, Marriott, Hilton, Hyatt |
|
| Read More | |
|
2025-01-17 HPE Faces Potential Data Breach Exposing Sensitive InformationLearn about the potential security risks for enterprises using HPE products and the importance of safeguarding source code and certificate keys. |
|
|
A potential data breach at Hewlett Packard Enterprise (HPE) has been reported, with a threat actor claiming to have accessed sensitive company data, including private GitHub repositories, Docker builds, source code for products, and certificate keys. The exposure could compromise product integrity and present security risks to enterprises using HPE technology. Concerns about financial fraud also arose due to HPE's rumored use of WePay. The company has not yet confirmed the breach or its scope, and investigations are presumably ongoing. |
Risks: Sensitive Data, Git/Repo Breach, Shadow IT/Exposed Assets, Hardcoded Secrets CVEs: N/A |
|
Keywords: HPE, Data Breach, Source Code, Certificate Keys, IntelBroker, Dark Web Affected: Hewlett Packard Enterprise, Zerto, Integrated Lights-Out, SAP Hybris, WePay |
|
| Read More | |
|
2025-01-17 Wolf Haldenstein Data Breach Exposes 3.5 Million IndividualsLearn about the significant impact of data breaches on law firms and how CloudGuard can offer comprehensive protection to safeguard sensitive information and prevent similar incidents. |
|
|
Wolf Haldenstein Adler Freeman & Herz LLP experienced a data breach on December 13, 2023, affecting nearly 3.5 million individuals. The breach involved unauthorized access to confidential data on the firm's servers. Although the firm detected the breach in December 2023, they have not yet contacted all affected individuals due to incomplete contact information. They are offering credit monitoring services to those potentially impacted and advise vigilance against suspicious activities. The firm has not clarified whether the exposed data includes client or employee information. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: Wolf Haldenstein, Data Breach, Law Firm, Personal Information, Network Security Affected: Wolf Haldenstein Adler Freeman & Herz LLP |
|
| Read More | |
|
2025-01-17 Ivanti Updates Fix Critical Vulnerabilities in Endpoint Manager and Other ProductsLearn about the critical importance of proactive vulnerability management and how to articulate the value of robust security solutions to clients. |
|
|
Ivanti has released security updates to fix critical vulnerabilities in multiple products, including Endpoint Manager (EPM), Avalanche, and Application Control Engine. The critical flaws, primarily affecting EPM, involve absolute path traversal that could allow unauthorized access to sensitive information. Ivanti also addressed high-severity vulnerabilities in Avalanche and Application Control Engine that could enable authentication bypass and information leaks. There is currently no evidence of these vulnerabilities being exploited in the wild, and Ivanti has enhanced its internal security measures to improve flaw detection and remediation. |
Risks: Patch Management, Sensitive Data, Web App/Website Vulnerability CVEs: CVE-2024-10811; CVE-2024-13161; CVE-2024-13160; CVE-2024-13159 |
|
Keywords: Ivanti, Endpoint Manager, Vulnerabilities, Security Updates, Path Traversal, Avalanche, Application Control Engine Affected: Ivanti Endpoint Manager, Avalanche, Application Control Engine |
|
| Read More | |
|
2025-01-16 FortiGate Devices Compromised by Belsen Group Data LeakNeed some ammo against Fortinet? Learn how a breach exposed critical vulnerabilities in FortiGate devices and understand the importance of robust security measures. |
|
|
A new hacking group, the Belsen Group, has leaked configuration files, IP addresses, and VPN credentials for over 15,000 FortiGate devices on the dark web, exposing sensitive information to cybercriminals. The leaked data includes private keys and firewall rules and is organized by country and IP address. This breach is believed to be linked to the exploitation of a zero-day vulnerability, CVE-2022–40684, in FortiOS before it was patched in version 7.2.2. Despite the data being collected in 2022, it still poses significant security risks to affected networks. |
Risks: Zero-Day, Sensitive Data, Weak or Compromised Credentials, Patch Management CVEs: CVE-2022-40684; CVE-2018-13379 |
|
Keywords: FortiGate, Belsen Group, Data Leak, VPN Credentials, Zero-Day Vulnerability, CVE-2022-40684 Affected: FortiGate, FortiOS |
|
| Read More | |
|
2025-01-15 Microsoft Patches 161 Vulnerabilities Including Three Actively Exploited Zero-DaysLearn about the critical importance of timely patch management to protect against actively exploited vulnerabilities and how Check Point solutions can help safeguard Microsoft environments. |
|
|
Microsoft's January 2025 security update addresses 161 vulnerabilities, including three actively exploited zero-days within Windows Hyper-V NT Kernel Integration VSP, which are privilege escalation flaws potentially used in post-compromise scenarios. The update also resolves several critical vulnerabilities, notably in Microsoft Digest Authentication and SPNEGO Extended Negotiation, which could allow remote code execution without user interaction. This update marks the highest number of CVEs addressed in a single month since 2017, highlighting the importance of prompt patching to mitigate potential security risks. |
Risks: Zero-Day, Privilege Escalation, Patch Management CVEs: CVE-2024-7344; CVE-2025-21333; CVE-2025-21334; CVE-2025-21335; CVE-2025-21186; CVE-2025-21366; CVE-2025-21395; CVE-2025-21275; CVE-2025-21308; CVE-2025-21294; CVE-2025-21295; CVE-2025-21298; CVE-2025-21307; CVE-2025-21311 |
|
Keywords: Microsoft, Zero-Day, Hyper-V, Vulnerabilities, Patch Management, Remote Code Execution, Privilege Escalation Affected: Microsoft, Windows Hyper-V NT Kernel Integration VSP, Windows Secure Boot, Microsoft Access, Windows App Package Installer, Windows Themes, Microsoft Digest Authentication, SPNEGO Extended Negotiation (NEGOEX), Windows Object Linking and Embedding (OLE), Windows Reliable Multicast Transport Driver (RMCAST), Windows NTLM |
|
| Read More | |
|
2025-01-15 SAP Patches Critical Vulnerabilities in NetWeaver PlatformLearn about the critical importance of patch management to protect SAP systems from severe vulnerabilities and safeguard enterprise data. |
|
|
SAP's January 2025 Patch Day includes the release of 14 new security notes, addressing critical vulnerabilities in its NetWeaver platform. The most severe issues involve an improper authentication bug and an information disclosure flaw, both posing significant risks to application confidentiality, integrity, and availability. Additional patches resolve a high-severity SQL injection vulnerability in NetWeaver and other notable flaws in SAP's BusinessObjects Business Intelligence platform and SAPSetup. The remaining notes cover medium- and low-severity defects across various SAP components. |
Risks: Patch Management, Weak or Compromised Credentials, Web App/Website Vulnerability CVEs: CVE-2025-0070; CVE-2025-0066; CVE-2025-0063; CVE-2025-0061; CVE-2025-0060; CVE-2025-0069 |
|
Keywords: SAP, NetWeaver, ABAP, CVE-2025-0070, CVE-2025-0066, SQL Injection, Vulnerability Patch Affected: NetWeaver AS for ABAP, ABAP Platform, Informix database, BusinessObjects Business Intelligence platform, SAPSetup, Business Workflow, Flexible Workflow, GUI for Windows |
|
| Read More | |
|
2025-01-14 OneBlood Ransomware Attack Exposes Donor Data and Disrupts OperationsLearn about the critical importance of cybersecurity in healthcare and how breaches can severely impact operations and data privacy. |
|
|
OneBlood, a blood-donation not-for-profit, experienced a ransomware attack in July 2024, resulting in the theft of donors' personal data, specifically names and Social Security numbers. The attack disrupted operations, causing delays in blood collection and distribution. An investigation completed in December 2024 confirmed the breach occurred on July 14, 2024, with threat actors maintaining network access until July 29. OneBlood has since notified affected individuals, offering a year of free credit monitoring and advising on additional protective measures. The total number of impacted individuals remains undisclosed. |
Risks: Sensitive Data, Malware CVEs: N/A |
|
Keywords: OneBlood, Ransomware, Data Breach, Healthcare Cybersecurity, Donor Data, Network Security Affected: OneBlood |
|
| Read More | |
|
2025-01-14 CISA Adds Exploited BeyondTrust and Qlik Sense Vulnerabilities to CatalogLearn about the critical importance of patch management and how vulnerabilities in widely used remote support tools can lead to major breaches, demonstrating the need for comprehensive security solutions. |
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a medium-severity vulnerability in BeyondTrust Privileged Remote Access and Remote Support products to its Known Exploited Vulnerabilities catalog due to active exploitation. This flaw, alongside a previously reported critical vulnerability, was identified following a cyber incident involving a compromised Remote Support SaaS API key, which was used in a breach attributed to the Chinese state-sponsored group Silk Typhoon, targeting the U.S. Treasury Department. Additionally, a critical vulnerability in Qlik Sense, previously exploited by the Cactus ransomware group, was also added to the catalog, with federal agencies mandated to patch these vulnerabilities by February 3, 2024, to prevent further threats. |
Risks: Zero-Day, API Vulnerability, Privilege Escalation, Third-Party Vendor/SaaS |
|
Keywords: BeyondTrust, CISA, Vulnerabilities, Silk Typhoon, Qlik Sense, Remote Support, API Key Breach Affected: BeyondTrust Privileged Remote Access, BeyondTrust Remote Support, Qlik Sense, U.S. Treasury Department |
|
| Read More | |
|
2025-01-14 Fortinet Firewalls Targeted in Mass Exploitation CampaignNeed some ammo against Fortinet? Discover the implications of unpatched vulnerabilities and mass exploitation campaigns. |
|
|
In December, a mass exploitation campaign targeted Fortinet firewalls, potentially utilizing an unpatched zero-day vulnerability, although the exact flaw remains unidentified. Attackers accessed FortiGate firewalls through internet-exposed management interfaces, altering configurations and using SSL VPN tunnels for persistence. This allowed them to steal credentials for lateral movement within networks. The intrusions began in November, with suspicious activity involving unusual IP addresses and web-based command-line interface interactions. Despite notifying Fortinet, the specific vulnerability and its resolution remain unconfirmed. |
Risks: Zero-Day, Misconfiguration, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: Fortinet, FortiGate, Zero-Day, Exploitation, SSL VPN, Credential Theft Affected: Fortinet, FortiGate, SSL VPN, Active Directory |
|
| Read More | |
|
2025-01-13 IBM watsonx.ai Vulnerability Allows XSS Attacks in Web UIDiscover how vulnerabilities in AI platforms like IBM watsonx.ai emphasize the critical need for robust cloud security solutions, presenting an opportunity to showcase CloudGuard's capabilities. |
|
|
IBM has disclosed a vulnerability in its watsonx.ai platform that could allow authenticated users to perform cross-site scripting (XSS) attacks by embedding arbitrary JavaScript code in the Web UI. This affects both Cloud Pak for Data and standalone installations, potentially leading to credential disclosure and altered functionality. The vulnerability highlights the need for robust security measures as AI technologies become more integral to business operations. |
Risks: Web App/Website Vulnerability, Third-Party Vendor/SaaS CVEs: CVE-2024-49785 |
|
Keywords: IBM watsonx.ai, XSS vulnerability, Cloud Pak for Data, JavaScript injection, AI security Affected: IBM watsonx.ai, Cloud Pak for Data |
|
| Read More | |
|
2025-01-13 BayMark Health Services Data Breach from Ransomware AttackLearn about the importance of robust cybersecurity measures in the healthcare industry to prevent data breaches and ransomware attacks. |
|
|
BayMark Health Services, a major addiction treatment provider in the US, experienced a ransomware attack that led to a data breach, compromising personal information of patients, including names, birthdates, and sensitive identification and treatment details. The breach affected their IT systems from late September to mid-October. BayMark has begun notifying affected patients and is offering free identity protection and credit monitoring services. The Ransomhub ransomware group claims to have stolen 1.5 terabytes of data, which they have made publicly available. The exact number of individuals impacted remains undisclosed. |
Risks: Sensitive Data, Malware CVEs: N/A |
|
Keywords: BayMark Health Services, Ransomware, Data Breach, Patient Data, Identity Protection Affected: BayMark Health Services |
|
| Read More | |
|
2025-01-13 T-Mobile Faces Lawsuit Over Major Data Breach Affecting MillionsWant some FUD to demonstrate the $$$ effect of breaches (and maybe check for a possible opportunity)? Read about T-Mobile's disastrous breach outcomes. |
|
|
T-Mobile is facing a lawsuit from Washington State over a data breach that exposed sensitive information of over 2 million residents. The breach, discovered in August 2021, affected more than 79 million people nationwide. The lawsuit alleges T-Mobile's negligence in cybersecurity, citing inadequate security measures, poor password practices, and failure to act on known vulnerabilities. It also accuses T-Mobile of not properly notifying affected customers about the breach's severity. This incident follows a history of cyberattacks on the company and highlights their insufficient data protection practices. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: T-Mobile, Data Breach, Lawsuit, Washington State, Cybersecurity Negligence Affected: T-Mobile |
|
| Read More | |
|
2025-01-13 Capital Markets Elite Group Data Breach Exposes Sensitive Customer InformationWant some FUD to demonstrate the $$$ effect of breaches and the critical need for robust cybersecurity measures? Read about Capital Markets Elite Group’s data breach and its potential regulatory implications. |
|
|
The Capital Markets Elite Group (CMEG), a financial services firm, experienced a significant data breach in January 2025, resulting in the exposure of sensitive customer information, including personal and contact details, on a dark web forum. This incident highlights the vulnerabilities in CMEG's data security protocols and underscores the critical need for financial institutions to implement robust cybersecurity measures to protect against unauthorized access. The breach may have regulatory consequences, potentially leading to fines and reputational damage, emphasizing the importance of compliance with data protection standards. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: Capital Markets Elite Group, data breach, financial services, customer data exposure, dark web, regulatory compliance Affected: Capital Markets Elite Group |
|
| Read More | |
|
2025-01-09 Optimizing Security Through Vendor ConsolidationWant to show customers the benefits of simplifying their security stack? Learn how consolidating security solutions can lead to operational efficiency and cost savings. |
|
|
In today's fiscal landscape, security teams face pressure to optimize budgets by consolidating point solutions into a platform-based approach. This rationalization of security tools can lead to cost savings, streamlined management, simplified operations, and improved security outcomes. By reducing the number of disparate tools, organizations can centralize management, ease maintenance, and enhance visibility, which also facilitates talent recruitment and retention. Moreover, consolidation improves the flow of telemetry data and simplifies reporting, allowing security teams to demonstrate their value more effectively to stakeholders. Overall, adopting a platform-based approach offers strategic benefits, including operational efficiencies and budgetary savings. |
Risks: N/A CVEs: N/A |
|
Keywords: Security Consolidation, Platform Solutions, Operational Efficiency, Cost Optimization, Talent Retention Affected: N/A |
|
| Read More | |
|
2025-01-09 Critical Vulnerability in GFI KerioControl Allows Remote Code ExecutionLearn about the critical importance of securing firewall products and the potential risks of unpatched vulnerabilities, and how proactive measures can protect your clients. |
|
|
Hackers are actively exploiting a critical vulnerability in GFI KerioControl firewalls that allows remote code execution by manipulating HTTP headers through a CRLF injection flaw. This vulnerability affects versions 9.2.5 to 9.4.5 and can lead to the theft of admin CSRF tokens, enabling attackers to upload malicious files and gain unauthorized access. Recent scans have detected exploitation attempts, and with nearly 24,000 internet-exposed instances, it's advised to restrict access and monitor for suspicious activities if patching isn't feasible. |
Risks: Patch Management, Web App/Website Vulnerability, Privilege Escalation CVEs: CVE-2024-52875 |
|
Keywords: GFI KerioControl, CVE-2024-52875, Remote Code Execution, Firewall Vulnerability, CRLF Injection Affected: GFI KerioControl |
|
| Read More | |
|
2025-01-09 Ivanti Software Vulnerability Exploited for Remote Code ExecutionLearn about the critical impact of unpatched vulnerabilities and how CloudGuard can help protect against sophisticated malware threats like those exploiting Ivanti software. |
|
|
A critical security flaw in Ivanti Connect Secure and Policy Secure, identified as CVE-2025-0282, is being actively exploited, allowing unauthenticated remote code execution. The exploitation involves a series of sophisticated steps to compromise systems, including deploying malware like DRYHOOK and PHASEJAM. Ivanti has issued patches for this and another related high-severity flaw, CVE-2025-0283. The exploitation has been observed by Mandiant, which noted the use of the SPAWN malware ecosystem to maintain persistence and communicate with attackers. The U.S. CISA has added CVE-2025-0282 to its Known Exploited Vulnerabilities list, urging organizations to apply patches promptly. |
Risks: Zero-Day, Malware, Privilege Escalation, Patch Management CVEs: CVE-2025-0282; CVE-2025-0283 |
|
Keywords: Ivanti, CVE-2025-0282, Remote Code Execution, PHASEJAM, SPAWN Malware, Mandiant Affected: Ivanti Connect Secure, Ivanti Policy Secure, Ivanti Neurons for ZTA, SELinux, Google-owned Mandiant |
|
| Read More | |
|
2025-01-09 Medusind Discloses Data Breach Affecting 360,000 IndividualsLearn about the potential risks and financial impacts of data breaches in the healthcare industry and leverage this knowledge to highlight the importance of robust cloud security solutions. |
|
|
Medusind, a medical billing firm, disclosed a data breach affecting 360,934 individuals, exposing personal and health information from December 2023. The breach involved sensitive data such as health insurance, payment details, medical history, and government IDs. Upon discovery, Medusind engaged cybersecurity experts to investigate and is offering two years of free identity monitoring services to those affected. This disclosure coincides with proposed updates to HIPAA by the U.S. Department of Health and Human Services, aiming to enhance patient data security following recent large-scale healthcare data breaches. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: Medusind, Data Breach, Healthcare Security, Personal Information Exposure, Identity Theft Affected: Medusind, healthcare industry |
|
| Read More | |
|
2025-01-09 Unpatched Vulnerabilities in Fancy Product Designer and SonicWall FirmwareLearn about the critical importance of timely patch management and how unpatched vulnerabilities can lead to severe security risks, providing an opportunity to highlight the need for robust security solutions. |
|
|
The Fancy Product Designer WordPress plugin has two critical security vulnerabilities that remain unpatched, affecting over 20,000 users. These vulnerabilities allow unauthenticated arbitrary file uploads and SQL injection, leading to potential remote code execution and database compromise. Despite being informed of these issues in March 2024, the vendor has not addressed them in their updates. Meanwhile, SonicWall has issued a patch for a high-severity vulnerability in its SSL VPN and SSH management, urging immediate updates to prevent exploitation. The patch also addresses additional security issues, including a weak PRNG and SSRF vulnerability. |
Risks: Patch Management, Web App/Website Vulnerability, Privilege Escalation, Open Source CVEs: CVE-2024-51919; CVE-2024-51818; CVE-2024-53704; CVE-2024-40762; CVE-2024-53705; CVE-2024-53706 |
|
Keywords: WordPress, Fancy Product Designer, SonicWall, CVE-2024-51919, CVE-2024-51818, SQL Injection, Remote Code Execution, SSL VPN Affected: WordPress, WooCommerce, SonicWall, SSL VPN, SSH, SonicOS, AWS, Azure |
|
| Read More | |
|
2025-01-09 Palo Alto Networks Patches Critical Vulnerabilities in Expedition ToolNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
Palo Alto Networks has issued patches to fix multiple security vulnerabilities in its Expedition migration tool, which is no longer supported as of December 31, 2024. The flaws could allow attackers, both authenticated and unauthenticated, to access and manipulate sensitive data including usernames, passwords, device configurations, and API keys. The vulnerabilities include SQL injection, cross-site scripting, file deletion, file enumeration, and OS command injection. These issues present significant security risks, especially given the tool's role in facilitating firewall migrations to Palo Alto's platform. |
Risks: Patch Management, Sensitive Data, Web App/Website Vulnerability CVEs: CVE-2025-0103; CVE-2025-0104; CVE-2025-0105; CVE-2025-0106; CVE-2025-0107 |
|
Keywords: Palo Alto Networks, Expedition Tool, Vulnerabilities, Patches, CVE, End-of-Life Affected: Palo Alto Networks Expedition, PAN-OS software |
|
| Read More | |
|
2025-01-07 HHS Proposes Major HIPAA Updates to Boost Healthcare CybersecurityNew opportunity - healthcare organizations are under threat from evolving cybersecurity requirements. Time to get out your rolodex and offer CloudGuard solutions. |
|
|
The US Department of Health and Human Services (HHS) is proposing significant amendments to the HIPAA security rule to enhance cybersecurity measures for protecting electronic protected health information (PHI). These changes, set to be published in the Federal Register, include mandatory implementation of security controls such as multifactor authentication, enhanced encryption, and regular security audits. The amendments aim to address the evolving threat landscape, which has seen a dramatic increase in breaches against healthcare organizations. Key proposals include maintaining up-to-date technology asset inventories, conducting thorough risk analyses, and enforcing encryption of PHI both at rest and in transit. |
Risks: N/A CVEs: N/A |
|
Keywords: HIPAA, HHS, healthcare security, PHI protection, multifactor authentication, encryption, compliance audits Affected: Healthcare organizations |
|
| Read More | |
|
2025-01-07 Nuclei Vulnerability Allows Signature Bypass and Code ExecutionLearn about the risks of using untrusted templates in vulnerability scanners and how Check Point's solutions can help secure against signature bypass and code execution vulnerabilities. |
|
|
A high-severity vulnerability has been identified in ProjectDiscovery's Nuclei, an open-source vulnerability scanner, that could allow attackers to bypass signature checks and execute malicious code. This flaw affects all versions after 3.0.0 and is due to a discrepancy in how newline characters are handled between the signature verification process and the YAML parser. Attackers can inject malicious content into templates while maintaining valid signatures, bypassing crucial verification steps. This is exacerbated by the use of regular expressions for signature validation, allowing attackers to exploit untrusted templates, potentially leading to arbitrary command execution and data breaches. |
Risks: Open Source, Web App/Website Vulnerability, Supply Chain CVEs: CVE-2024-43405 |
|
Keywords: Nuclei, CVE-2024-43405, Vulnerability Scanner, Signature Bypass, Code Execution, YAML Parsing Affected: Nuclei |
|
| Read More | |
|
2025-01-07 Xstrahl Data Breach Exposes 150GB of Sensitive InformationNeed to highlight the importance of robust cybersecurity in healthcare? This article showcases the potential risks and opportunities for CloudGuard solutions in safeguarding sensitive medical data. |
|
|
A recent data breach at Xstrahl, a medical technology company, resulted in the exposure of 150GB of sensitive data, including employee information, confidential projects, and contracts related to radiation therapy equipment. This incident highlights the critical need for enhanced cybersecurity measures in the healthcare sector due to the potential risks to patient safety, intellectual property, and corporate confidentiality. Experts emphasize the importance of stronger encryption, regular vulnerability assessments, and employee training to prevent such breaches. The situation serves as a wake-up call for the industry to bolster defenses against evolving cyber threats. |
Risks: Sensitive Data CVEs: N/A |
|
Keywords: Xstrahl, data breach, healthcare security, medical technology, sensitive data leak Affected: Xstrahl, healthcare sector, medical technology industry |
|
| Read More | |
|
2024-12-31 Azure Airflow Vulnerabilities Allow Unauthorized Cluster AccessNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure? This article is for you! |
|
|
Cybersecurity researchers identified three security vulnerabilities in Microsoft's Azure Data Factory Apache Airflow integration, which could allow attackers to gain unauthorized access and control over the entire Airflow Azure Kubernetes Service (AKS) cluster. These vulnerabilities involve misconfigured Kubernetes RBAC, poor secret handling, and weak authentication in Azure's Geneva service. Attackers could exploit these flaws to exfiltrate data, deploy malware, and manipulate log data. The research highlights the importance of managing service permissions and monitoring third-party services to prevent unauthorized access. Microsoft has updated documentation to address related access policy risks in Azure Key Vault. |
Risks: Misconfiguration, Over Permissive Roles, Privilege Escalation, Git/Repo Breach, Cloud Service Provider Flaw CVEs: N/A |
|
Keywords: Azure, Apache Airflow, Kubernetes, RBAC, Geneva Service, Data Factory, Vulnerabilities Affected: Microsoft Azure, Apache Airflow, Azure Kubernetes Service, Azure Key Vault, Amazon Bedrock, CloudTrail |
|
| Read More | |
|
2024-12-27 Palo Alto Networks Releases Patch for PAN-OS Denial-of-Service VulnerabilityNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
Palo Alto Networks has identified a high-severity vulnerability in its PAN-OS software that can lead to a denial-of-service (DoS) condition on affected devices. This flaw impacts specific versions of PAN-OS and Prisma Access and has been actively exploited. Palo Alto has released patches for various PAN-OS versions to mitigate the issue and advises disabling DNS Security logging as a workaround for unmanaged firewalls. The vulnerability has been included in CISA's Known Exploited Vulnerabilities catalog, mandating patch application by January 20, 2025, for certain agencies. |
Risks: Patch Management CVEs: CVE-2024-3393 |
|
Keywords: Palo Alto Networks, PAN-OS, CVE-2024-3393, Denial-of-Service, Vulnerability Patch Affected: Palo Alto Networks, PAN-OS, Prisma Access |
|
| Read More | |
|
2024-12-27 Apache MINA Vulnerability Enables Remote Code ExecutionLearn about the critical need for secure deserialization practices and timely patch management to protect cloud environments from severe vulnerabilities. |
|
|
The Apache MINA framework has a critical vulnerability that allows remote code execution due to unsafe deserialization in certain conditions. This flaw is present in versions 2.0.X, 2.1.X, and 2.2.X and requires specific usage patterns to be exploited. Apache has issued patches, but users must also configure their systems to restrict accepted classes for deserialization to mitigate the risk. The announcement follows recent security fixes in other Apache projects, highlighting the importance of timely updates to protect against exploitation. |
Risks: Patch Management, Open Source, Web App/Website Vulnerability CVEs: CVE-2024-52046; CVE-2024-56337; CVE-2024-45387; CVE-2024-43441; CVE-2024-53677 |
|
Keywords: Apache MINA, Remote Code Execution, CVE-2024-52046, Java Deserialization, Vulnerability Patch Affected: Apache MINA, Apache Tomcat, Apache Traffic Control, HugeGraph-Server, Apache Struts |
|
| Read More | |
|
2024-12-26 Critical SQL Injection Vulnerability Fixed in Apache Traffic ControlLearn about the critical vulnerabilities in popular Apache open-source projects and the importance of proactive patch management to protect cloud environments. |
|
|
The Apache Software Foundation has released updates to fix a critical SQL injection vulnerability in Apache Traffic Control, which could allow privileged users to execute arbitrary SQL commands. This vulnerability affects versions 8.0.0 to 8.0.1 and has been resolved in version 8.0.2. Apache Traffic Control is an open-source CDN solution. The issue was identified by a researcher from Tencent YunDing Security Lab. Concurrently, the ASF has also addressed other vulnerabilities, including an authentication bypass in Apache HugeGraph-Server and a remote code execution flaw in Apache Tomcat. Users are advised to update to the latest versions to mitigate these risks. |
Risks: Patch Management, Over Permissive Roles, Open Source, Web App/Website Vulnerability |
|
Keywords: Apache Traffic Control, SQL Injection, CVE-2024-45387, Open Source Security, Vulnerability Patch, CDN Security Affected: Apache Traffic Control, Apache HugeGraph-Server, Apache Tomcat |
|
| Read More | |
|
2024-12-24 CISA Identifies Exploited Vulnerability in Acclaim USAHERDS SoftwareLearn about the critical importance of timely patch management to protect cloud environments from vulnerabilities actively exploited in the wild. |
|
|
CISA has added a high-severity vulnerability in Acclaim Systems USAHERDS to its Known Exploited Vulnerabilities catalog due to active exploitation. The flaw, found in versions 7.4.0.1 and earlier, involves hard-coded credentials that could allow remote code execution if attackers acquire the necessary keys. Although initially exploited by the APT41 group in 2021, agencies are advised to implement mitigations by January 13, 2025, to protect against potential threats. |
Risks: Zero-Day, Hardcoded Secrets, Web App/Website Vulnerability CVEs: CVE-2021-44207; CVE-2024-53961 |
|
Keywords: USAHERDS, CISA, CVE-2021-44207, APT41, ColdFusion Vulnerability Affected: Acclaim Systems USAHERDS, Adobe ColdFusion |
|
| Read More | |
|
2024-12-23 Apache Tomcat Vulnerability Could Lead to Remote Code ExecutionLearn about the importance of proper configuration management and the risks of unpatched vulnerabilities in Apache Tomcat environments. |
|
|
The Apache Software Foundation has released a security update for Tomcat server software to address a vulnerability that could lead to remote code execution (RCE) under specific conditions. This issue is related to a previous vulnerability and involves a Time-of-check Time-of-use (TOCTOU) race condition that can occur on case-insensitive file systems when the default servlet is enabled for writing. Users may need to adjust configurations based on their Java version to fully mitigate the risk. |
Risks: Misconfiguration, Open Source, Patch Management CVEs: CVE-2024-56337; CVE-2024-50379 |
|
Keywords: Apache Tomcat, CVE-2024-56337, Remote Code Execution, TOCTOU, Security Update Affected: Apache Tomcat |
|
| Read More | |
|
2024-12-20 CISA Mandates Cloud Security Compliance for Federal Agencies by 2025Learn how the latest CISA directive on cloud security standards can drive opportunities with federal agencies by showcasing the necessity of robust cloud security solutions like Check Point CloudGuard. |
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has issued Binding Operational Directive 25-01, requiring federal civilian agencies to secure their cloud environments by adhering to Secure Cloud Business Applications (SCuBA) secure configuration baselines by 2025. This directive aims to mitigate risks from cloud misconfigurations and weak security controls, with agencies needing to identify cloud tenants, deploy automated configuration assessment tools, and integrate with CISA's monitoring infrastructure. Additionally, CISA advises broader adoption of these practices and provides new mobile communication security guidelines in response to cyber espionage threats, including the use of end-to-end encrypted messaging and enhanced security measures for mobile devices. |
Risks: Misconfiguration, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: CISA, Cloud Security, SCuBA, Federal Agencies, Microsoft 365, Cyber Espionage, Mobile Security Affected: Microsoft 365, Azure Active Directory, Entra ID, Microsoft Defender, Exchange Online, Power Platform, SharePoint Online, OneDrive, Microsoft Teams |
|
| Read More | |
|
2024-12-20 Critical Vulnerability in BeyondTrust Products Exploited in the WildLearn about the importance of patch management and how proactive security measures can protect against critical vulnerabilities and cyber attacks. |
|
|
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical command injection vulnerability in BeyondTrust's Privileged Remote Access and Remote Support products to its Known Exploited Vulnerabilities list due to evidence of active exploitation. The flaw allows unauthorized users to execute arbitrary commands. While BeyondTrust has updated its cloud instances, users with self-hosted versions need to apply specific patches. BeyondTrust was recently targeted in a cyber attack, revealing the vulnerability and leading to further investigation that uncovered another medium-severity flaw. All affected customers have been notified, but the scope of the attack and the identities of the attackers remain unknown. |
Risks: Patch Management, Privilege Escalation, API Vulnerability, Third-Party Vendor/SaaS CVEs: CVE-2024-12356; CVE-2024-12686 |
|
Keywords: BeyondTrust, CVE-2024-12356, Command Injection, Remote Support, Privileged Remote Access, Vulnerability Exploitation Affected: BeyondTrust Privileged Remote Access, BeyondTrust Remote Support |
|
| Read More | |
|
2024-12-20 Sophos Releases Hotfixes for Critical Firewall VulnerabilitiesNeed some ammo against Sophos? Discover how vulnerabilities in their Firewall products could expose businesses and highlight the importance of comprehensive security solutions. |
|
|
Sophos has released hotfixes for three vulnerabilities in its Firewall products, two of which are critical, that could allow remote code execution and privileged access. While there is no evidence of these being exploited, they impact versions 21.0 GA and older. Users are advised to update to the latest versions to mitigate these risks. Temporary workarounds include restricting SSH access and reconfiguring HA settings. The update follows recent charges against a Chinese national for exploiting a different Sophos Firewall vulnerability. |
Risks: Patch Management, Weak or Compromised Credentials, Web App/Website Vulnerability CVEs: CVE-2024-12727; CVE-2024-12728; CVE-2024-12729; CVE-2020-12271 |
|
Keywords: Sophos Firewall, CVE-2024-12727, CVE-2024-12728, CVE-2024-12729, Remote Code Execution, Vulnerability Patch Affected: Sophos Firewall |
|
| Read More | |
|
2024-12-18 Azure Data Factory Vulnerabilities Risk Cloud Infrastructure SecurityNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure? This article is for you! |
|
|
Researchers identified three vulnerabilities in Azure Data Factory's Apache Airflow integration that could let attackers gain unauthorized control over an enterprise's cloud infrastructure. These flaws, involving misconfigured Kubernetes role-based access control, improper secret handling of Azure's Geneva service, and weak authentication, could allow persistent shadow administrative access, potentially leading to data exfiltration and malware deployment. Exploitation could occur via unauthorized DAG file manipulation or compromised Git repository access. Although Microsoft classified these as low-severity, the vulnerabilities underscore the need for robust cloud security measures beyond perimeter defenses, emphasizing internal permissions, configurations, and comprehensive monitoring. |
Risks: Misconfiguration, Over Permissive Roles, Git/Repo Breach, Weak or Compromised Credentials, Cloud Service Provider Flaw CVEs: N/A |
|
Keywords: Azure Data Factory, Apache Airflow, Kubernetes RBAC, Cloud Vulnerabilities, Microsoft Azure, Geneva Service Affected: Microsoft Azure, Apache Airflow, Azure Kubernetes Service (AKS), Azure Geneva service |
|
| Read More | |
|
2024-12-18 Telecom Namibia Hit by Ransomware, Sensitive Data LeakedLearn about the critical importance of refusing to negotiate with cybercriminals and how Check Point CloudGuard can strengthen defenses against ransomware attacks. |
|
|
Telecom Namibia, a state-owned telecom company, suffered a ransomware attack resulting in the leak of sensitive customer data, including information about top government officials. The hackers, known as Hunters International, released the data after Telecom Namibia refused to pay the ransom. The breach involved nearly 500,000 pieces of personal and financial data. The company is collaborating with security officials to mitigate further impact and has warned against sharing the leaked information, urging customers to change their passwords and remain vigilant. Ransomware typically involves locking data until a ransom is paid, but Telecom Namibia has firmly stated it will not negotiate with the attackers. |
Risks: Sensitive Data, Malware CVEs: N/A |
|
Keywords: Ransomware, Telecom Namibia, Data Leak, Cyberattack, Hunters International Affected: Telecom Namibia |
|
| Read More | |
|
2024-12-17 Texas Tech University Health Sciences Center Data Breach Exposes 1.4 Million Patient RecordsLearn about the critical need for robust cybersecurity measures in healthcare institutions and how Check Point solutions can help prevent data breaches and protect sensitive patient data. |
|
|
The Texas Tech University Health Sciences Center experienced a cyberattack in September 2024, affecting 1.4 million patients by potentially exposing sensitive information, including personal and medical data. The Interlock ransomware group claimed responsibility, leaking 2.6 TB of data on the dark web. Affected individuals are being notified and offered credit monitoring services, while being advised to stay alert for potential scams. |
Risks: Sensitive Data, Ransomware CVEs: N/A |
|
Keywords: Texas Tech, Health Sciences Center, Data Breach, Ransomware, Interlock, Patient Data Affected: Texas Tech University Health Sciences Center, Texas Tech University Health Sciences Center El Paso |
|
| Read More | |
|
2024-12-17 CISA Warns of Vulnerabilities in Adobe ColdFusion and Windows Kernel-Mode DriverLearn about the critical importance of proactive vulnerability management to protect against threats in widely used systems like Adobe ColdFusion and Windows. |
|
|
The Cybersecurity and Infrastructure Security Agency (CISA) has highlighted two critical vulnerabilities involving Adobe ColdFusion and Microsoft Windows Kernel-Mode Driver, which are actively being exploited. These vulnerabilities, related to improper access control and untrusted pointer dereference, pose significant risks by potentially allowing unauthorized access and code execution with elevated privileges. CISA's warning emphasizes the importance of applying available patches and encourages both federal agencies and private organizations to adopt proactive vulnerability management practices to mitigate these threats. |
Risks: Patch Management, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-20767; CVE-2024-35250 |
|
Keywords: CISA, Adobe ColdFusion, Windows Kernel-Mode Driver, CVE-2024-20767, CVE-2024-35250, Vulnerability Management, Exploited Vulnerabilities Affected: Adobe ColdFusion, Microsoft Windows Kernel-Mode Driver |
|
| Read More | |
|
2024-12-17 New Glutton Malware Exploits PHP Frameworks in Cyber AttacksDiscover how vulnerabilities in popular PHP frameworks like Laravel and ThinkPHP can lead to significant security threats and learn how CloudGuard can protect against such modular malware attacks. |
|
|
The newly discovered Glutton malware is a PHP-based backdoor used in cyberattacks across multiple countries, attributed to the Chinese group Winnti. It targets popular PHP frameworks like Laravel and ThinkPHP, exploiting vulnerabilities to harvest sensitive data and inject malicious code. Despite its links to Winnti, Glutton lacks typical stealth features, using unencrypted communications and brute-force attacks for initial access. It features a modular framework capable of executing a range of commands and leveraging cybercriminal tools against their creators. The malware's strategy includes exploiting cybercrime resources for further attacks, creating a recursive attack chain. |
Risks: Malware, Web App/Website Vulnerability, Open Source, Zero-Day CVEs: N/A |
|
Keywords: Glutton malware, PHP frameworks, Winnti, APT41, cybercrime market, Laravel, ThinkPHP, ELF backdoor Affected: Laravel, ThinkPHP, Yii, Baota (BT), PHP frameworks, FastCGI Process Manager, ELF backdoor, cybercrime forums |
|
| Read More | |
|
2024-12-17 ConnectOnCall Breach Exposes Over 910,000 Patients' DataDiscover the critical importance of securing telehealth platforms and how breaches can impact patient trust and data integrity. |
|
|
The breach of ConnectOnCall, a telehealth subsidiary of Phreesia, exposed the personal and health data of over 910,000 patients between February and May 2024. The breach involved unauthorized access to provider-patient communications, revealing sensitive information such as names, phone numbers, and health-related details. Following the incident, Phreesia involved law enforcement, engaged cybersecurity experts, and took ConnectOnCall offline to enhance its security. They assured that their other services remain unaffected and advised impacted individuals to monitor for potential identity theft. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: ConnectOnCall, Phreesia, Data Breach, Telehealth Security, Patient Data Exposure Affected: ConnectOnCall, Phreesia, U.S. Department of Health and Human Services |
|
| Read More | |
|
2024-12-13 Thousands of Prometheus Instances Exposed to Security VulnerabilitiesLearn about the critical importance of securing monitoring tools like Prometheus to protect sensitive data and prevent costly breaches. |
|
|
The article highlights the exposure of over 300,000 Prometheus monitoring instances, putting sensitive credentials and API keys at risk. Lack of proper authentication allows attackers to access critical information, and public exposure of endpoints like "/debug/pprof" can lead to denial-of-service and remote code execution attacks. These vulnerabilities, previously noted by researchers, allow unauthorized data access, revealing internal endpoints and valuable network information. Organizations are urged to secure Prometheus servers with authentication, limit public access, and monitor for unusual activity to mitigate these risks. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Weak or Compromised Credentials, API Vulnerability CVEs: N/A |
|
Keywords: Prometheus, Node Exporter, Information Leakage, Denial-of-Service, Remote Code Execution, Endpoint Security, Authentication Affected: Prometheus, Prometheus Node Exporter |
|
| Read More | |
|
2024-12-13 Apache Struts 2 Vulnerability Enables Remote Code ExecutionLearn about the critical importance of patch management and protecting cloud environments from vulnerabilities in widely used software frameworks like Apache Struts 2. |
|
|
The article discusses a critical remote code execution (RCE) vulnerability in Apache Struts 2 that has been patched. The flaw allows attackers to exploit file upload parameters to execute malicious code remotely, and it has a high severity rating. Apache advises upgrading to version 6.4.0 or later, as there are no workarounds, and applications not using the deprecated File Upload Interceptor are not affected. Users must update to the Action File Upload Interceptor and rewrite actions for compatibility. Despite newer frameworks, Struts 2 remains popular, with substantial download requests, highlighting the urgency of addressing this vulnerability. |
Risks: Patch Management, Web App/Website Vulnerability, Open Source |
|
Keywords: Apache Struts 2, CVE-2024-53677, Remote Code Execution, Vulnerability, File Upload Interceptor Affected: Apache Struts 2 |
|
| Read More | |
|
2024-12-12 Critical Vulnerability in Hunk Companion Plugin Allows Installation of Exploitable PluginsLearn about the importance of timely updates and patch management to prevent exploitation of known vulnerabilities in WordPress plugins. |
|
|
Hackers are exploiting a critical vulnerability in the Hunk Companion WordPress plugin to install other outdated plugins with known vulnerabilities, allowing them to execute remote code, perform SQL injection, and create backdoor admin accounts. This vulnerability, affecting all versions before 1.9.0, was discovered by WPScan and has been actively exploited to compromise WordPress sites. A security update has been released to address the issue, but many sites remain at risk due to unpatched installations. |
Risks: Zero-Day, Patch Management, Web App/Website Vulnerability, Open Source |
|
Keywords: Hunk Companion, WordPress vulnerability, CVE-2024-11972, plugin exploitation, remote code execution Affected: Hunk Companion, WordPress, WP Query Console |
|
| Read More | |
|
2024-12-11 Ivanti Releases Security Updates for Critical Vulnerabilities in CSA and Connect SecureLearn about the crucial importance of timely patch management to protect against severe vulnerabilities in cloud security products. |
|
|
Ivanti has released critical security updates to fix several serious vulnerabilities in its Cloud Services Application (CSA) and Connect Secure products, which could lead to privilege escalation and remote code execution. These vulnerabilities, which include authentication bypass, command injection, SQL injection, argument injection, and insecure permissions, have been addressed in updated versions of the affected products. Although there are currently no reports of these vulnerabilities being actively exploited, Ivanti urges users to update promptly due to the history of past vulnerabilities being targeted by state-sponsored attackers. |
Risks: Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-11639; CVE-2024-11772; CVE-2024-11773; CVE-2024-11633; CVE-2024-11634; CVE-2024-8540 |
|
Keywords: Ivanti, Cloud Services Application, Connect Secure, Vulnerabilities, Security Updates, CVE, Remote Code Execution Affected: Ivanti Cloud Services Application, Ivanti Connect Secure, Ivanti Policy Secure, Ivanti Sentry |
|
| Read More | |
|
2024-12-11 Cybercriminals Exploit AWS Vulnerabilities to Steal CredentialsNeed some FUD? Want to demonstrate and understand how vulnerable cloud environments are and the importance of secure credential management? This article is for you! |
|
|
Cybercriminal groups Nemesis and ShinyHunters exploited vulnerabilities in public websites to steal AWS credentials and other sensitive data from thousands of organizations. The operation involved scanning millions of sites for vulnerable endpoints, leveraging tools like Shodan for domain discovery, and targeting known application vulnerabilities. The attackers stored the stolen data in an unsecured AWS S3 bucket, leading to their discovery. AWS took immediate action to mitigate the impact and notify affected customers, emphasizing the shared responsibility model in cloud security. Organizations are advised to avoid hardcoding credentials, use web application firewalls, and implement security best practices to protect their cloud environments. |
Risks: Misconfiguration, Web App/Website Vulnerability, Hardcoded Secrets, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: AWS, Cloud Vulnerabilities, Credential Theft, Nemesis, ShinyHunters, Cyber Attack Affected: AWS, Ticketmaster |
|
| Read More | |
|
2024-12-11 Microsoft Patches Critical CLFS Vulnerability in December 2024 UpdateLearn about the critical importance of patch management and how Check Point can help secure systems against actively exploited vulnerabilities like the CLFS privilege escalation flaw. |
|
|
Microsoft's December 2024 Patch Tuesday addressed 72 security vulnerabilities, including a critical privilege escalation flaw in the Windows Common Log File System (CLFS) that has been actively exploited. The update also resolved significant issues in Windows Lightweight Directory Access Protocol (LDAP) and other components, as well as NTLM vulnerabilities, prompting Microsoft to bolster security measures across various services. Additionally, the U.S. CISA mandated remediation of the exploited CLFS vulnerability by December 31, 2024. The update aligns with Microsoft's ongoing efforts to phase out NTLM and improve security defaults. Other major vendors have also issued security updates recently. |
Risks: Privilege Escalation, Patch Management CVEs: CVE-2024-49138; CVE-2022-24521; CVE-2022-37969; CVE-2023-23376; CVE-2023-28252; CVE-2024-49112; CVE-2024-49117; CVE-2024-49105; CVE-2024-49063 |
|
Keywords: Microsoft, CLFS vulnerability, Patch Tuesday, privilege escalation, NTLM, LDAP, ransomware Affected: Microsoft Windows, Windows Common Log File System (CLFS), Windows Lightweight Directory Access Protocol (LDAP), Windows Hyper-V, Remote Desktop Client, Microsoft Muzic, NT LAN Manager (NTLM), Microsoft Exchange Server, Active Directory Certificate Services (AD CS), LDAP, Windows Server, Azure Directory Certificate Services, Windows Explorer |
|
| Read More | |
|
2024-12-11 Exploitation of Cleo Products Despite Previous PatchLearn about the importance of timely patch management and how vulnerabilities can still be exploited even after initial patches, highlighting the need for comprehensive security solutions. |
|
|
A vulnerability in Cleo's Harmony, VLTrader, and LexiCom file management products is being actively exploited, even on systems thought to be patched, leading to unauthorized access and potential compromise of servers. Despite Cleo's previous patch efforts, the flaw allows attackers to execute remote code, impacting industries such as consumer products, food, and shipping. Huntress researchers observed these exploit attempts on numerous servers and provided detection rules and mitigation advice while Cleo works on a new patch. The attacks involve stealthy installation and deletion of autorun files and JAR files to maintain persistence, and Cleo users are advised to reconfigure their software to mitigate the impact. |
Risks: Zero-Day, Patch Management, Remote Code Execution CVEs: CVE-2024-50623 |
|
Keywords: Cleo, Harmony, VLTrader, LexiCom, Zero-Day, Remote Code Execution, Vulnerability, Patch Management Affected: Cleo Harmony, Cleo VLTrader, Cleo LexiCom, consumer products industry, food industry, trucking industry, shipping industry, Active Directory |
|
| Read More | |
|
2024-12-11 Critical Vulnerabilities in SAP NetWeaver Allow Malicious PDF UploadsLearn about the critical importance of timely patch management to prevent vulnerabilities in enterprise solutions like SAP NetWeaver. |
|
|
On December 10, 2024, SAP released a security update for its NetWeaver Application Server for Java to address multiple high-severity vulnerabilities in the Adobe Document Services component. These vulnerabilities, notably including a server-side request forgery flaw, allow attackers to upload malicious PDF files, potentially compromising sensitive information and enabling unauthorized access to internal systems. The exploitation risks include data breaches, unauthorized access to intellectual property, and compromised system integrity. SAP recommends immediate application of Security Note 3536965 and additional security measures to mitigate these risks. |
Risks: Patch Management, Web App/Website Vulnerability |
|
Keywords: SAP NetWeaver, Adobe Document Services, CVE-2024-47578, SSRF, Vulnerability Patch Affected: SAP NetWeaver Application Server for Java, Adobe Document Services |
|
| Read More | |
|
2024-12-10 QNAP Patches Critical Vulnerabilities in QTS and QuTS Hero SystemsLearn about the critical importance of timely patch management to protect against high-severity vulnerabilities in widely-used storage solutions. |
|
|
QNAP has issued patches for several high-severity vulnerabilities in its QTS and QuTS Hero systems, including a command injection flaw and a CRLF injection bug, both with significant security risks. The updates, available in specific software builds, also address an improper certificate validation vulnerability and other medium to low-severity flaws. Additionally, a high-severity issue in License Center and a medium-severity flaw in Qsync Central have been patched. While there is no indication of these vulnerabilities being exploited in the wild, users are advised to update their systems promptly to prevent potential attacks. |
Risks: Patch Management, Web App/Website Vulnerability, Other: Injection CVEs: CVE-2024-50393; CVE-2024-48868; CVE-2024-48865; CVE-2024-48863 |
|
Keywords: QNAP, Vulnerabilities, Patches, QTS, QuTS Hero, Command Injection, CRLF Injection Affected: QNAP, QTS, QuTS Hero, License Center, Qsync Central |
|
| Read More | |
|
2024-12-10 OpenWrt Vulnerability Allows Malicious Firmware InjectionGot you some real good FUD, learn about the dangers of supply chain attacks through vulnerabilities in custom firmware. |
|
|
A vulnerability in OpenWrt's Attended Sysupgrade feature allowed attackers to inject malicious firmware images by exploiting a command injection flaw and a hash truncation issue. OpenWrt, used for customizing network devices, had a critical flaw that was quickly patched after discovery. The flaw involved insecure handling of package names in server code and inadequate hash security, enabling attackers to deliver malicious firmware by reusing legitimate cache keys. Despite the fix, users are advised to verify their firmware integrity. |
Risks: Supply Chain, Open Source, Malware, Other: Command Injection CVEs: CVE-2024-54143 |
|
Keywords: OpenWrt, Vulnerability, Firmware Injection, Command Injection, Supply Chain Attack, Network Devices Affected: OpenWrt, ASUS, Belkin, Buffalo, D-Link, Zyxel |
|
| Read More | |
|
2024-12-09 BreakingWAF Vulnerability Exposes Major Companies to Cyber ThreatsDiscover how widespread WAF misconfigurations create vulnerabilities in Fortune 100 companies, presenting a significant opportunity to showcase CloudGuard's superior security solutions. |
|
|
A vulnerability named "BreakingWAF" has been found in the configuration of web application firewall (WAF) services used by major providers like Akamai, Cloudflare, Fastly, and Imperva, affecting around 40% of Fortune 100 companies. This flaw allows attackers to bypass WAF protections and directly access backend servers, leading to potential denial-of-service attacks, ransomware, or application compromise. The issue affects over 140,000 domains, exposing numerous backend servers to cyber threats. Zafran researchers have suggested mitigation measures such as IP whitelisting, pre-shared secrets in custom headers, and mutual TLS to address the vulnerability. Affected companies have been notified, with some already resolving the issue. |
Risks: Misconfiguration, Web App/Website Vulnerability, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: BreakingWAF, Akamai, Cloudflare, Imperva, Fortune 100, WAF vulnerability, DoS attack, CDN security Affected: Akamai, Cloudflare, Fastly, Imperva, JPMorgan Chase, Visa, Intel, Berkshire Hathaway, UnitedHealth |
|
| Read More | |
|
2024-12-08 Ultralytics AI Library Compromised by Cryptocurrency MinerGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
In a recent software supply chain attack, two versions of the popular Ultralytics AI library on PyPI were compromised to include a cryptocurrency miner. This was achieved through a malicious code injection in the build environment using a GitHub Actions Script Injection, allowing unauthorized modifications post-code review. The affected versions, 8.3.41 and 8.3.42, have been removed, and a security fix has been implemented. Users are advised to update to the latest version to ensure security. |
Risks: Supply Chain, Open Source, Git/Repo Breach, Malware CVEs: N/A |
|
Keywords: Ultralytics, PyPI, cryptocurrency miner, supply chain attack, GitHub Actions, open source security Affected: Ultralytics AI library, PyPI, GitHub, ComfyUI |
|
| Read More | |
|
2024-12-07 Security Vulnerabilities Found in Popular Open-Source ML FrameworksWant to understand how unpatched vulnerabilities in open-source ML frameworks can lead to security risks in cloud environments? This article is for you! |
|
|
Cybersecurity researchers have identified multiple vulnerabilities in widely used open-source machine learning frameworks such as MLflow, H2O, PyTorch, and MLeap. These vulnerabilities, which include issues like cross-site scripting, unsafe deserialization, and path traversal, could allow attackers to execute code and perform lateral movement within an organization. This poses a significant risk as it may expose sensitive information, compromise ML model registries, and backdoor stored models. To mitigate these threats, organizations are advised to carefully vet the ML models they use and avoid loading untrusted models, even from seemingly safe repositories, as this can lead to remote code execution and substantial organizational harm. |
Risks: Open Source, Remote Code Execution, Web App/Website Vulnerability, Supply Chain CVEs: CVE-2024-27132; CVE-2024-6960; CVE-2023-5245 |
|
Keywords: Machine Learning, Open-Source Vulnerabilities, MLflow, PyTorch, H2O, MLeap, Remote Code Execution, ML Security Affected: MLflow, H2O, PyTorch, MLeap |
|
| Read More | |
|
2024-12-06 Chinese State Hackers Breach Global Telecom NetworksNew opportunity - telecommunications companies are under threat from state-sponsored attacks. Time to get out your rolodex. |
|
|
Chinese state-sponsored hackers, known as Salt Typhoon, have breached telecommunications companies in dozens of countries, including eight firms in the U.S. This ongoing campaign, which may have started up to two years ago, has not compromised classified communications but has accessed private networks, including those of government officials. The Cybersecurity and Infrastructure Security Agency (CISA) and the FBI confirmed the breaches, advising the use of encrypted communication to thwart interception attempts. T-Mobile reported recent breaches from a connected provider but claims to have resolved the issue. CISA, in collaboration with the FBI, NSA, and international partners, has issued guidance to strengthen network defenses against such attacks. |
Risks: Sensitive Data, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: N/A |
|
Keywords: Salt Typhoon, Telecom Breach, Chinese State Hackers, CISA, T-Mobile, Verizon, AT&T, Lumen Technologies Affected: Telecommunications companies, T-Mobile, Verizon, AT&T, Lumen Technologies |
|
| Read More | |
|
2024-12-06 Mitel MiCollab Vulnerabilities Expose Sensitive Files via Exploit ChainLearn about the critical importance of timely patch management and the potential risks of unpatched collaboration tools in enterprise environments. |
|
|
A proof-of-concept exploit demonstrates how a zero-day arbitrary file read vulnerability in Mitel MiCollab can be combined with a previously patched critical bug to access sensitive files on affected systems. Despite Mitel being informed over 100 days ago, a patch for the zero-day is still pending. MiCollab is a widely used enterprise collaboration tool, making it an appealing target for cybercriminals. The earlier critical flaw, which allowed path traversal and unauthorized data access, was fixed in October. However, the new flaw remains unpatched, allowing potential attackers to bypass authentication and access critical system files. |
Risks: Zero-Day, Sensitive Data, Patch Management, Web App/Website Vulnerability CVEs: CVE-2024-35286; CVE-2024-41713 |
|
Keywords: Mitel MiCollab, Zero-Day, SQL Injection, Exploit Chain, Vulnerability, Enterprise Collaboration Affected: Mitel MiCollab, NuPoint Unified Messaging (NPM) component |
|
| Read More | |
|
2024-12-05 Merseyside Hospitals Hit by Cyber Attack, Data Breach InvestigatedNew opportunity - hospitals and healthcare facilities are under threat. Time to get out your rolodex and discuss how CloudGuard can secure their systems. |
|
|
Three hospitals in Merseyside, including Alder Hey Children's NHS Foundation Trust, Liverpool Heart and Chest Hospital, and Royal Liverpool University Hospital, have been targeted in a cyber attack, following a similar incident at Wirral's Arrowe Park hospital. The attackers have potentially accessed confidential data, which they have threatened to release. Investigations are ongoing to determine the extent of the data breach, but the affected hospitals have secured their systems. While services at Alder Hey were not disrupted, Wirral University Teaching Hospital Trust is still in the process of recovering services, prioritizing emergency treatment, and urging patients with non-urgent issues to seek alternative healthcare options. Authorities, including the National Crime Agency and National Cyber Security Centre, are involved in the response effort. |
Risks: Sensitive Data CVEs: N/A |
|
Keywords: Merseyside, NHS, healthcare, cyber attack, data breach, Alder Hey, hospital security Affected: Alder Hey Children's NHS Foundation Trust, Liverpool Heart and Chest Hospital, Royal Liverpool University Hospital, Wirral University Teaching Hospital Trust |
|
| Read More | |
|
2024-12-04 Stoli Group Files for Bankruptcy After Ransomware Attack and Asset SeizureUnderstand the severe impact of ransomware attacks on business operations and financial stability, highlighting the necessity of robust cybersecurity solutions to prevent such disruptions. |
|
|
Stoli Group's U.S. subsidiaries have filed for bankruptcy following a ransomware attack in August 2024 that disrupted their IT systems and enterprise resource planning (ERP) platform, forcing manual operations and hindering financial reporting. The incident compounded financial strain from Russian authorities seizing the company's last remaining distilleries in Russia and ongoing legal battles over vodka trademark rights. The ransomware attack and asset seizure have led to significant operational and financial challenges, with recovery expected by early 2025. |
Risks: Malware, Other: Ransomware Attack CVEs: N/A |
|
Keywords: Ransomware, Stoli Group, Bankruptcy, IT Disruption, Asset Seizure, ERP System, Financial Impact Affected: Stoli Group, Stoli USA, Kentucky Owl, enterprise resource planning (ERP) platform |
|
| Read More | |
|
2024-12-04 Critical Vulnerability Exposes Files in SailPoint IdentityIQLearn about the critical importance of securing IAM solutions and the potential consequences of unpatched vulnerabilities in identity management systems. |
|
|
A critical vulnerability in SailPoint's IdentityIQ software, affecting versions 8.2, 8.3, 8.4, and others, allows unauthorized access to files in the application directory. The flaw involves improper handling of file names, enabling access to protected content. It is rated with a maximum severity score, but details remain scarce, and no security advisory has been issued by SailPoint. |
Risks: Web App/Website Vulnerability, Sensitive Data, Misconfiguration CVEs: CVE-2024-10905 |
|
Keywords: SailPoint, IdentityIQ, CVE-2024-10905, IAM Vulnerability, Unauthorized Access Affected: SailPoint IdentityIQ |
|
| Read More | |
|
2024-12-04 Veeam Patches Critical Vulnerabilities in Service Provider ConsoleLearn about the critical importance of timely patch management to safeguard against remote code execution vulnerabilities in cloud services. |
|
|
Veeam has released patches for critical vulnerabilities in its Service Provider Console, including a severe remote code execution flaw. These vulnerabilities, affecting versions 8.1.0.21377 and earlier, have been resolved in version 8.1.0.21999. The vulnerabilities could allow remote code execution and NTLM hash leakage, with no available mitigations other than upgrading to the latest version. |
Risks: Patch Management, Remote Code Execution CVEs: CVE-2024-42448; CVE-2024-42449 |
|
Keywords: Veeam, Service Provider Console, Remote Code Execution, Vulnerability, NTLM Hash Leakage, Patch Management Affected: Veeam Service Provider Console |
|
| Read More | |
|
2024-12-04 Organizations Move Towards Consolidated Cybersecurity PlatformsDiscover the shift towards cybersecurity platforms and the opportunity to capture market share as organizations streamline their security tools, with Check Point positioned as a key player. |
|
|
Cybersecurity leaders are overwhelmed by the number of security tools they manage, with most organizations operating between 21 to 50 tools. Although three-quarters want to reduce this number, 87% have added more tools in the past year due to the expanding threat landscape. The transition to streamlined cybersecurity platforms is expected over the next three to five years as existing contracts end. Key players like CrowdStrike, Palo Alto Networks, Fortinet, and Check Point are poised to benefit from this shift, though a diverse vendor ecosystem remains important. |
Risks: N/A CVEs: N/A |
|
Keywords: Cybersecurity Platforms, Tool Consolidation, Threat Landscape, Check Point, Market Opportunities Affected: CrowdStrike, Palo Alto Networks, Fortinet, Check Point |
|
| Read More | |
|
2024-12-04 Vulnerabilities in Palo Alto Networks and SonicWall VPN Clients Allow Remote Code ExecutionNeed some ammo against Palo Alto Networks and SonicWall? This article is for you! |
|
|
The article discusses vulnerabilities in Palo Alto Networks and SonicWall VPN clients, which can be exploited to execute remote code on Windows and macOS systems. These flaws allow attackers to manipulate VPN client behavior and execute commands by exploiting the trust placed in servers. The vulnerabilities include insufficient certificate validation and improper handling of client updates, potentially leading to privileged code execution. Palo Alto Networks and SonicWall have released patches to address these issues, emphasizing the importance of updating to the latest versions to prevent possible exploitation. |
Risks: Privilege Escalation, Patch Management, Other: VPN Client Vulnerability CVEs: CVE-2024-5921; CVE-2024-29014 |
|
Keywords: Palo Alto Networks, SonicWall, VPN Vulnerability, Remote Code Execution, NachoVPN Affected: Palo Alto Networks GlobalProtect, SonicWall SMA100 NetExtender |
|
| Read More | |
|
2024-12-03 Major Corporations Hit by Data Breach Linked to MOVEit VulnerabilityLearn about the critical importance of patch management and how vulnerabilities in widely-used tools like MOVEit can lead to massive data breaches, creating opportunities for CloudGuard solutions to secure sensitive data. |
|
|
A significant data breach linked to vulnerabilities in the MOVEit file transfer tool has resulted in the exposure of personal data for hundreds of thousands of employees from major corporations such as Xerox, Nokia, Bank of America, and Morgan Stanley. The breach, exploited by the Cl0p ransomware group since May 2023, has led to the leakage of sensitive employee details, including names, phone numbers, email addresses, and job-related information, on a cybercrime forum. This breach underscores the severe risks posed by unpatched vulnerabilities and highlights the potential for social engineering attacks targeting the affected organizations. |
Risks: Sensitive Data, Patch Management, Third-Party Vendor/SaaS CVEs: CVE-2023-34362 |
|
Keywords: MOVEit vulnerability, data breach, Cl0p ransomware, employee data leak, CVE-2023-34362, Xerox, Nokia, Bank of America, Morgan Stanley Affected: Xerox, Nokia, Koch, Bank of America, Morgan Stanley, Amazon, Bridgewater, JLL |
|
| Read More | |
|
2024-12-03 AWS Launches Security Incident Response Service for Efficient Incident ManagementNeed some ammo against AWS? Have a customer or prospect that uses AWS? This article is for you! |
|
|
AWS has introduced a new service called AWS Security Incident Response, designed to enhance organizational security by managing security incidents more efficiently. This service provides automated monitoring and investigation, streamlined communication via tools like Amazon GuardDuty and AWS Security Hub, and 24/7 expert support from the AWS Customer Incident Response Team. It offers automated triage, simplified communication and coordination, and access to expert support, all aimed at improving incident response performance. Organizations can onboard through AWS Organizations and benefit from features like proactive incident response and containment capabilities. Pricing starts at $7,000 per month, with costs increasing based on AWS spending. |
Risks: N/A CVEs: N/A |
|
Keywords: AWS, Security Incident Response, GuardDuty, AWS Security Hub, Cloud Security, Incident Management Affected: AWS, Amazon GuardDuty, AWS Security Hub |
|
| Read More | |
|
2024-12-02 SmokeLoader Malware Targets Taiwan's Manufacturing, Healthcare, and IT SectorsNew opportunity - companies in the manufacturing, healthcare, and IT industries are under threat from SmokeLoader malware. Time to get out your rolodex. |
|
|
The SmokeLoader malware has resurfaced, targeting manufacturing, healthcare, and IT sectors in Taiwan. Known for its advanced evasion techniques and modular design, SmokeLoader serves as a downloader to deliver other malware but can also execute attacks itself by downloading plugins from its command-and-control server. Despite a decline in activity after Operation Endgame dismantled its infrastructure, SmokeLoader remains active due to publicly available cracked versions. The recent campaign begins with phishing emails containing Excel attachments exploiting old vulnerabilities to deploy SmokeLoader, which uses plugins to steal sensitive data and perform various attacks. |
Risks: Malware, Sensitive Data, Patch Management CVEs: CVE-2017-0199; CVE-2017-11882 |
|
Keywords: SmokeLoader, Malware, Phishing, Taiwan, Manufacturing, Healthcare, IT Security, Data Theft, Ande Loader Affected: Manufacturing, Healthcare, Information Technology, Microsoft Excel, Outlook, Thunderbird, FileZilla, WinSCP |
|
| Read More | |
|
2024-12-01 Active Directory Certificate Services Vulnerability Enables Privilege EscalationNeed some FUD? Learn about the critical vulnerabilities in Microsoft's Active Directory Certificate Services and the importance of securing certificate infrastructures to protect against domain compromises. |
|
|
A critical vulnerability in Microsoft's Active Directory Certificate Services (AD CS) allows attackers to escalate privileges and potentially gain domain admin access by manipulating certificate requests. Discovered by TrustedSec in October 2024, this exploit, known as ESC15, affects AD CS environments using version 1 certificate templates with specific configurations. It enables attackers with basic enrollment rights to bypass restrictions and gain unauthorized privileges by crafting Certificate Signing Requests (CSRs) that override intended attributes. This vulnerability highlights ongoing challenges in securing AD CS infrastructures and poses a risk of domain compromise, particularly through the commonly used WebServer template. |
Risks: Privilege Escalation, Misconfiguration, Over Permissive Roles CVEs: CVE-2024-49019 |
|
Keywords: Active Directory, Certificate Services, ESC15, EKUwu, Microsoft, Privilege Escalation, AD CS Vulnerability Affected: Microsoft, Active Directory Certificate Services |
|
| Read More | |
|
2024-11-29 Cyberattack Causes System Outage at UK Hospital NetworkLearn about the critical importance of robust cybersecurity measures in healthcare and how disruptions can impact essential services. |
|
|
A cyberattack on Wirral University Teaching Hospital, part of the NHS Foundation Trust in the UK, has caused significant disruption by leading to a systems outage, forcing the postponement of appointments and scheduled procedures. The hospital network, which includes Arrowe Park, Clatterbridge, and Wirral Women and Children's Hospitals, has been operating under business continuity processes using manual systems. This has resulted in increased waiting times and limited availability of services like X-rays and surgeries, with no clear timeline for full system restoration. |
Risks: Other: System Outage CVEs: N/A |
|
Keywords: Healthcare Cyberattack, NHS Trust, System Outage, Hospital Network, Incident Response Affected: Wirral University Teaching Hospital, NHS Foundation Trust, Arrowe Park Hospital, Clatterbridge Hospital, Wirral Women and Children's Hospital |
|
| Read More | |
|
2024-11-28 First Linux UEFI Bootkit 'Bootkitty' Discovered Targeting UbuntuNeed some FUD? Learn about the emerging threat of Linux UEFI bootkits and how they highlight vulnerabilities in cloud environments. |
|
|
The discovery of 'Bootkitty,' the first UEFI bootkit malware targeting Linux, marks a shift in bootkit threats that have traditionally focused on Windows. This proof-of-concept malware specifically affects certain Ubuntu versions, bypassing kernel signature verification during system boot using a self-signed certificate. Although Bootkitty is not yet a fully developed threat, it signifies an evolution in the UEFI bootkit space. The malware hooks UEFI security protocols to bypass Secure Boot and modifies GRUB functions to disable signature verification, allowing malicious modules to load. Despite its potential, Bootkitty's current implementation is limited by compatibility issues and remains unsuitable for widespread deployment. |
Risks: Malware, Privilege Escalation, Open Source CVEs: N/A |
|
Keywords: UEFI bootkit, Linux malware, Bootkitty, Ubuntu security, ESET research, Secure Boot bypass Affected: Ubuntu, GRUB, Linux kernel |
|
| Read More | |
|
2024-11-28 npm Package @0xengine/xmlrpc Turns Malicious, Steals Data and Mines CryptocurrencyGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
A software supply chain attack was discovered involving the npm package @0xengine/xmlrpc, which was initially a legitimate JavaScript-based XML-RPC server and client for Node.js, but later became malicious. The attack involved adding code to steal sensitive data and mine cryptocurrency, distributed through npm and a GitHub repository named yawpp. The malware harvests data, establishes persistence, and uses XMRig to mine cryptocurrency on compromised systems. This incident underscores the need for vigilance in monitoring software supply chains, as packages can become threats over time. |
Risks: Sensitive Data, Malware, Supply Chain, Open Source, Git/Repo Breach CVEs: N/A |
|
Keywords: npm, supply chain attack, data theft, cryptocurrency mining, @0xengine/xmlrpc, Node.js, GitHub Affected: npm, Node.js, yawpp, GitHub, Dropbox, file.io, systemd, XMRig, Monero |
|
| Read More | |
|
2024-11-28 ProjectSend Vulnerability CVE-2024-11680 Allows Code ExecutionLearn about the importance of timely patch management and how exploiting unpatched vulnerabilities can lead to major security risks. |
|
|
A critical security vulnerability in the ProjectSend file-sharing application, originally reported in January 2023 and patched in August 2024, is being actively exploited. The flaw allows attackers to execute arbitrary PHP code on affected servers by bypassing authorization checks. Despite the availability of a patched version, only 1% of the 4,000 internet-exposed ProjectSend servers have been updated, leaving the majority susceptible to attacks that include web shell installations and potential malicious JavaScript embedding. Users are urged to update to the latest version to protect against these threats. |
Risks: Patch Management, Web App/Website Vulnerability, Open Source CVEs: CVE-2024-11680 |
|
Keywords: ProjectSend, CVE-2024-11680, Code Execution, Open Source Vulnerability, Web Shell Affected: ProjectSend |
|
| Read More | |
|
2024-11-27 IBM Patches Critical RCE Flaws in Data Virtualization Manager and Security SOARLearn about the crucial role of timely patch management in preventing vulnerabilities and securing your clients' IT infrastructure. |
|
|
IBM has released patches for several vulnerabilities in its products, including serious remote code execution issues in Data Virtualization Manager and Security SOAR. These vulnerabilities could allow attackers to execute arbitrary code or cause system disruptions. The company also addressed high-severity flaws in Watson Speech Services and OpenSSL, as well as various medium- and low-severity security issues in Engineering Lifecycle Management and other products. IBM has provided fix packs and guidance to mitigate these risks. |
Risks: Patch Management, Web App/Website Vulnerability, Other: Prototype Pollution CVEs: CVE-2024-52899; CVE-2024-45801; CVE-2024-49353; CVE-2024-6119 |
|
Keywords: IBM, RCE, Data Virtualization Manager, Security SOAR, Vulnerability, Patch Management, CVE-2024-52899, CVE-2024-45801 Affected: Data Virtualization Manager, Security SOAR, Watson Speech Services Cartridge for Cloud Pak for Data, OpenSSL, Engineering Lifecycle Management, IBM Workload Scheduler, Watson Query, Db2 Big SQL on Cloud Pak for Data |
|
| Read More | |
|
2024-11-27 Evaluation of Cloud Service Provider Firewall EffectivenessNeed some ammo against AWS, Azure, or GCP? Have a customer or prospect that uses these CSPs? This article is for you! |
|
|
CyberRatings.org conducted an independent test of cloud service provider native firewalls from AWS, Azure, and GCP, revealing significant disparities in their security effectiveness. The firewalls were evaluated against 522 exploits, with GCP blocking 264, Azure blocking 126, and AWS blocking only 2. The tests focused on known vulnerabilities from the last decade with medium or higher severity. Despite ease of deployment, the low block rates highlight the need for improvement in native firewall security. Customers are advised to consider third-party solutions for enhanced protection until these native firewalls demonstrate higher security effectiveness. |
Risks: Cloud Service Provider Flaw CVEs: N/A |
|
Keywords: AWS firewall, Azure firewall, GCP firewall, cloud security, CSP evaluation, native firewall performance Affected: Amazon Web Services, Microsoft Azure, Google Cloud Platform |
|
| Read More | |
|
2024-11-27 High-Risk Vulnerability Found in NVIDIA UFM ProductsLearn about the critical importance of patch management for infrastructure tools and how timely updates can protect against privilege escalation and data tampering risks. |
|
|
A recently disclosed vulnerability in NVIDIA's UFM Enterprise, UFM Appliance, and UFM CyberAI products allows attackers to escalate privileges, tamper with data, cause denial of service, and access sensitive information due to improper authentication. Exploitation occurs via malformed requests through the Ethernet management interface, typically isolated from public networks. NVIDIA has issued firmware updates to address the issue, highlighting the importance of timely patch management for infrastructure tools with privileged access. Organizations using these products should promptly apply the updates to mitigate risk. |
Risks: Privilege Escalation, Patch Management CVEs: CVE-2024-0130 |
|
Keywords: NVIDIA, UFM Vulnerability, Privilege Escalation, Patch Management, CVE-2024-0130 Affected: NVIDIA UFM Enterprise, NVIDIA UFM Appliance, NVIDIA UFM CyberAI |
|
| Read More | |
|
2024-11-27 VMware Patches Critical Vulnerabilities in Aria OperationsLearn about the critical importance of patch management to prevent privilege escalation and cross-site scripting vulnerabilities in virtualized cloud environments. |
|
|
VMware has released patches for five high-severity vulnerabilities in its Aria Operations product, addressing issues that could allow attackers to elevate privileges or execute cross-site scripting attacks. These vulnerabilities include two local privilege escalation flaws that could lead to root access and three stored cross-site scripting vulnerabilities that enable script injection through various means, such as views and email templates. |
Risks: Patch Management, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-38830; CVE-2024-38831; CVE-2024-38832; CVE-2024-38833; CVE-2024-38834 |
|
Keywords: VMware, Aria Operations, Vulnerabilities, Privilege Escalation, Cross-Site Scripting, CVE-2024-38830, CVE-2024-38831, Patch Management Affected: VMware Aria Operations |
|
| Read More | |
|
2024-11-26 Critical Vulnerabilities in CleanTalk WordPress Plugin Allow Remote Code ExecutionLearn about the importance of patch management to protect WordPress sites from critical vulnerabilities that can lead to remote code execution. |
|
|
Two critical vulnerabilities in the CleanTalk WordPress Anti-Spam plugin, impacting over 200,000 sites, could allow unauthorized attackers to install and activate malicious plugins, potentially leading to remote code execution. The flaws involve authorization bypass issues, one due to a missing value check and another through reverse DNS spoofing. Users are advised to update to the latest versions, 6.44 and 6.45, which address these security issues. The situation coincides with ongoing campaigns exploiting compromised WordPress sites to inject malicious code, posing additional risks. |
Risks: Web App/Website Vulnerability, Patch Management, Privilege Escalation CVEs: CVE-2024-10542; CVE-2024-10781 |
|
Keywords: WordPress, CleanTalk, Remote Code Execution, CVE-2024-10542, CVE-2024-10781, Plugin Vulnerability, Authorization Bypass Affected: WordPress, CleanTalk Spam protection, Anti-Spam, FireWall plugin |
|
| Read More | |
|
2024-11-26 Blue Yonder Ransomware Attack Disrupts UK Grocery Supply ChainsLearn about the importance of securing managed services environments to prevent supply chain disruptions like those faced by Blue Yonder's clients. |
|
|
Blue Yonder, a supply chain management firm, experienced a ransomware attack on November 21, 2024, disrupting its managed services and impacting several high-profile clients, including UK grocery stores like Morrisons and Sainsbury, as well as Starbucks. The company, a Panasonic subsidiary, is working with external cybersecurity firms to recover while maintaining that its public cloud environment remains secure. Clients are advised to stay updated via Blue Yonder's customer update page, as no specific restoration timeline is available yet, and no ransomware group has claimed responsibility for the attack. |
Risks: Ransomware, Supply Chain, Third-Party Vendor/SaaS CVEs: N/A |
|
Keywords: Ransomware, Blue Yonder, Supply Chain Disruption, UK Grocery, Managed Services Affected: Morrisons, Sainsbury, Starbucks, Blue Yonder's managed services environment |
|
| Read More | |
|
2024-11-26 Critical Vulnerability in Array Networks Exploited by Cyber Espionage GroupNeed some ammo against Fortinet? This article is for you! Learn about the importance of patch management and how Check Point can help protect against such vulnerabilities. |
|
|
CISA has added a critical vulnerability affecting Array Networks AG and vxAG secure access gateways to its Known Exploited Vulnerabilities catalog due to active exploitation in the wild. The flaw involves missing authentication, allowing remote code execution via a vulnerable URL without authentication. The Chinese cyber espionage group Earth Kasha has been exploiting this vulnerability, alongside others in Proself and Fortinet products, primarily targeting Japanese and other international entities. The vulnerability has now been patched, and agencies are urged to update their systems promptly. |
Risks: Patch Management, Web App/Website Vulnerability, Other: Remote Code Execution |
|
Keywords: Array Networks, Earth Kasha, CVE-2023-28461, Remote Code Execution, Fortinet, Cyber Espionage Affected: Array Networks, Array AG, vxAG, Proself, Fortinet FortiOS, Fortinet FortiProxy |
|
| Read More | |
|
2024-11-26 New Attack Techniques Exploit Terraform and Open Policy Agent VulnerabilitiesNeed some FUD? Learn about the vulnerabilities in IaC and PaC tools like Terraform and OPA, and how they expose cloud platforms to new attack vectors. |
|
|
The article discusses newly discovered attack techniques targeting Infrastructure-as-Code (IaC) and Policy-as-Code (PaC) tools like Terraform and Open Policy Agent (OPA). These tools, which utilize domain-specific languages, are typically seen as secure but have vulnerabilities that can be exploited. An attacker can compromise OPA by inserting malicious policies to exfiltrate data using functions like "http.send" or "net.lookup_ip_addr." Terraform is also vulnerable as attackers can manipulate GitHub workflows through unreviewed changes in pull requests, using malicious data sources to achieve their goals. The article emphasizes the need for using trusted third-party components to mitigate these risks. |
Risks: Supply Chain, Git/Repo Breach, Weak or Compromised Credentials, Open Source CVEs: N/A |
|
Keywords: Terraform, Open Policy Agent, IaC vulnerabilities, PaC vulnerabilities, data exfiltration, DNS tunneling Affected: Terraform, Open Policy Agent |
|
| Read More | |
|
2024-11-26 Arizona State Database Breach Exposes Sensitive Personal DataDiscover the importance of robust cybersecurity protocols in public administration to highlight potential opportunities for CloudGuard solutions. |
|
|
A breach in Arizona’s state database has exposed sensitive personal information, highlighting vulnerabilities in public administration systems and raising concerns over data security and privacy. The leaked data, including names, addresses, and contact details, poses risks such as identity theft and fraud. The source of the leak is unclear, but it may be due to inadequate cybersecurity measures or a targeted attack. The incident underscores the need for robust cybersecurity protocols and regular audits to protect government infrastructure from cyberattacks. |
Risks: Sensitive Data, Other: Inadequate Cybersecurity Measures CVEs: N/A |
|
Keywords: Data Breach, Arizona State, Personal Information Leak, Government Cybersecurity, Identity Theft Affected: Arizona state database |
|
| Read More | |
|
2024-11-22 Fortinet VPN Logging Flaw Enables Undetected Brute-Force AttacksNeed some ammo against Fortinet? This article highlights a significant security flaw in Fortinet VPN that leaves organizations vulnerable to undetected brute-force attacks. |
|
|
A design flaw in Fortinet VPN's logging system allows successful brute-force attacks to go unnoticed by logging only failed login attempts. Attackers can verify credentials after the authentication stage without proceeding to authorization, preventing successful attempts from being recorded. This vulnerability enables attackers to validate credentials without alerting defenders, posing a significant security risk as they could use or sell the verified credentials later. The flaw complicates the detection of successful breaches during incident response, although failed attempts still indicate an ongoing brute-force attack. |
Risks: Weak or Compromised Credentials, Other: Logging Flaw CVEs: N/A |
|
Keywords: Fortinet, VPN, brute-force attack, logging flaw, credential verification Affected: Fortinet VPN |
|
| Read More | |
|
2024-11-22 Palo Alto Networks Firewalls Compromised by Exploited VulnerabilitiesNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
Hackers have compromised over 2,000 Palo Alto Networks firewalls by exploiting two recently patched zero-day vulnerabilities. These vulnerabilities include an authentication bypass in the PAN-OS management web interface, allowing remote attackers to gain administrator privileges, and a privilege escalation flaw enabling command execution with root privileges. Despite the company's assurance of limited impact, threat monitoring indicates widespread vulnerability, with over 2,700 devices at risk. Additionally, a critical flaw in the Expedition firewall configuration tool was exploited earlier, highlighting the ongoing challenge of securing Palo Alto Networks devices against emerging threats. |
Risks: Zero-Day, Privilege Escalation, Patch Management CVEs: CVE-2024-0012; CVE-2024-9474; CVE-2024-5910; CVE-2024-3400 |
|
Keywords: Palo Alto Networks, PAN-OS, Firewall Vulnerabilities, Authentication Bypass, Privilege Escalation Affected: Palo Alto Networks firewalls, PAN-OS, Expedition firewall configuration tool |
|
| Read More | |
|
2024-11-22 Gelsemium APT Targets Linux with New WolfsBane BackdoorNew opportunity - organizations in East and Southeast Asia are under threat from Linux-targeted espionage campaigns. Time to get out your rolodex. |
|
|
The article discusses the recent activities of the Chinese APT group Gelsemium, which has been deploying a new Linux backdoor called WolfsBane in cyber espionage campaigns targeting East and Southeast Asia. WolfsBane is a Linux adaptation of their existing Windows backdoor, Gelsevirine, and is used to gather sensitive data while maintaining persistent, stealthy access. Additionally, another implant named FireWood was discovered, linked to a different malware suite, Project Wood. The attackers possibly exploited a web application vulnerability to deliver these backdoors, leveraging rootkits for concealment. This marks Gelsemium's first documented use of Linux malware, reflecting a broader trend of APTs shifting focus toward Linux systems, driven by improvements in email and endpoint security. |
Risks: Malware, Sensitive Data, Web App/Website Vulnerability CVEs: N/A |
|
Keywords: Gelsemium, WolfsBane, Linux backdoor, cyber espionage, APT, East Asia, Southeast Asia Affected: Linux, Windows, East Asia, Southeast Asia, Taiwan, Philippines, Singapore |
|
| Read More | |
|
2024-11-21 Critical Vulnerabilities in Palo Alto Networks Firewalls Allow System TakeoverNeed some ammo against Palo Alto Networks? Discover the vulnerabilities in their firewall systems and understand the importance of secure development practices. |
|
|
Palo Alto Networks addressed two critical vulnerabilities in its firewalls and virtual security appliances that allowed attackers to execute code with high privileges, potentially taking full control of affected devices. These vulnerabilities stemmed from basic development errors, enabling authentication bypass and privilege escalation. Attackers could exploit these flaws to gain administrative access and execute code on the underlying OS. The vulnerabilities affected multiple PAN-OS versions, which have now been patched. Administrators are advised to update their systems and limit management interface exposure to trusted networks to mitigate risks. |
Risks: Zero-Day, Misconfiguration, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-0012; CVE-2024-9474; CVE-2024-3400 |
|
Keywords: Palo Alto Networks, PAN-OS, Firewall Vulnerabilities, Authentication Bypass, Privilege Escalation, CVE-2024-0012, CVE-2024-9474 Affected: Palo Alto Networks, PAN-OS, Palo Alto Panorama |
|
| Read More | |
|
2024-11-20 Oracle Agile PLM Framework Vulnerability Allows Unauthorized Data AccessLearn about the significance of security vulnerabilities in widely-used enterprise applications and how proactive measures can prevent unauthorized data access. |
|
|
Oracle has disclosed a critical security flaw in the Agile Product Lifecycle Management Framework that allows attackers to exploit it remotely without authentication, potentially leaking sensitive information. The vulnerability, which is actively being exploited, enables unauthorized access to files on the affected system. Details about the attackers and the extent of the attacks remain unknown. |
Risks: Sensitive Data, Web App/Website Vulnerability CVEs: CVE-2024-21287 |
|
Keywords: Oracle, Agile PLM, CVE-2024-21287, Data Breach, Unauthorized Access Affected: Agile Product Lifecycle Management Framework |
|
| Read More | |
|
2024-11-19 Custom IOCs Enhance Cybersecurity Threat DetectionLearn how utilizing custom IOCs can enhance threat detection and improve security postures, offering an edge in protecting cloud environments. |
|
|
The article discusses the importance of using custom Indicators of Compromise (IOCs) in cybersecurity to improve threat detection and response. While generic IOCs are often noisy, lack context, and are not tailored to specific threats, custom IOCs provide more relevant and actionable intelligence. They enhance threat hunting, offer targeted threat intelligence, boost supply chain security, align with industry or geographical needs, protect critical infrastructure, and improve compliance. As cyber threats evolve, integrating custom IOCs into security systems is essential for effective protection. |
Risks: N/A CVEs: N/A |
|
Keywords: Custom IOCs, Threat Detection, Cyber Threat Intelligence, Supply Chain Security, Compliance Affected: N/A |
|
| Read More | |
|
2024-11-19 Critical Vulnerabilities in VMware vCenter and Kemp LoadMaster Under Active ExploitationLearn about the critical importance of patch management and the opportunity to showcase CloudGuard's capabilities in defending against emerging threats and vulnerabilities in VMware and Progress Kemp LoadMaster environments. |
|
|
The article highlights active exploitation of critical vulnerabilities in VMware vCenter and Kemp LoadMaster, as noted by the U.S. Cybersecurity and Infrastructure Security Agency (CISA). The Kemp LoadMaster flaw, a command injection vulnerability, allows remote attackers full system access through the management interface and was patched in February 2024. VMware vCenter Server is also under attack due to two security flaws, initially resolved in September 2024, but requiring further patching last month. Additionally, a severe vulnerability in Veeam Backup & Replication is being exploited to deploy new ransomware. These incidents underscore the need for timely patch management and vigilance against emerging threats. |
Risks: Patch Management, Web App/Website Vulnerability, Malware CVEs: CVE-2024-1212; CVE-2024-38812; CVE-2024-38813; CVE-2024-40711 |
|
Keywords: VMware vCenter, Progress Kemp LoadMaster, CVE-2024-1212, CVE-2024-38812, Veeam Backup & Replication, Ransomware, Patch Management Affected: VMware vCenter, Progress Kemp LoadMaster, Veeam Backup & Replication |
|
| Read More | |
|
2024-11-19 Helldown Ransomware Expands to Target VMware and Linux SystemsLearn about evolving ransomware threats and the importance of protecting virtualized infrastructures in key industries like IT, telecom, and healthcare. |
|
|
The article discusses the emergence of a Linux variant of the Helldown ransomware, expanding its attacks to VMware and Linux systems. Helldown, derived from LockBit 3.0, targets virtualized infrastructures and sectors like IT, telecom, manufacturing, and healthcare using double extortion tactics. It exploits vulnerabilities in Zyxel firewalls for network entry, performing activities like credential harvesting and lateral movement. The Windows version deletes shadow copies and processes before encryption, while the Linux variant terminates VMs for file access, although this feature isn't fully utilized. The ransomware's development suggests it's not highly sophisticated yet. Helldown shares behavioral traits with DarkRace and coincides with the rise of other ransomware families like Interlock and SafePay, indicating a trend of ransomware groups expanding their capabilities and targeting diverse sectors. |
Risks: Malware, Weak or Compromised Credentials, Inadequate Network Segmentation, Other: Double Extortion CVEs: N/A |
|
Keywords: Helldown, ransomware, VMware, Linux, LockBit, Zyxel, double extortion, virtual machines Affected: VMware, Linux, Windows, Zyxel firewalls, IT services, telecommunications, manufacturing, healthcare |
|
| Read More | |
|
2024-11-18 BabbleLoader Malware Evades Detection to Deliver Information StealersNeed some FUD? Understand how advanced malware loaders like BabbleLoader evade detection and threaten cloud environments, highlighting the critical need for robust security solutions. |
|
|
BabbleLoader is a newly identified malware loader that stealthily delivers information-stealing malware like WhiteSnake and Meduza by evading antivirus and sandbox detection. It targets English and Russian-speaking users, often posing as accounting software. BabbleLoader uses advanced evasion techniques, such as junk code and metamorphic transformations, to bypass both traditional and AI-based detection systems. Each instance of BabbleLoader is unique, with randomized code and metadata, complicating analysis and detection. This loader exemplifies a growing trend in malware delivery methods that prioritize evasion to protect payloads, reducing the need for threat actors to frequently change their infrastructure. |
Risks: Malware, Supply Chain CVEs: N/A |
|
Keywords: BabbleLoader, Malware Evasion, Information Stealer, WhiteSnake, Meduza, Loader Techniques, Anti-Sandboxing Affected: BabbleLoader, WhiteSnake, Meduza, Dolphin Loader, Emmenhtal, FakeBat, Hijack Loader, CryptBot, Lumma Stealer, SectopRAT, SmokeLoader, Ursnif |
|
| Read More | |
|
2024-11-17 T-Mobile Targeted in Telecom Breaches by Chinese HackersNew opportunity - companies in the telecommunications industry are under threat from state-sponsored attacks. Time to get out your rolodex. |
|
|
T-Mobile was recently targeted in a wave of telecom breaches by Chinese state-sponsored threat actors aiming to access private communications, call records, and law enforcement information requests. Although T-Mobile claims no significant impact on its systems or customer data, the breaches have affected other major U.S. telecom companies like AT&T and Verizon. The attackers, known as Salt Typhoon, have a history of targeting government entities and telecom companies. The U.S. government confirmed that these breaches allowed the theft of sensitive communications and data related to national security officials. The attacks reportedly exploited vulnerabilities in Cisco routers, though Cisco denies any breach of their equipment. |
Risks: Sensitive Data, Other: State-Sponsored Attack CVEs: N/A |
|
Keywords: T-Mobile, Salt Typhoon, Chinese state-sponsored, telecom breaches, Cisco vulnerabilities Affected: T-Mobile, AT&T, Verizon, Lumen, U.S. telecommunications industry, Cisco routers |
|
| Read More | |
|
2024-11-17 Fortinet FortiClient Vulnerability Exploited by DEEPDATA Malware to Steal VPN CredentialsNeed some ammo against Fortinet? Discover how unpatched vulnerabilities in FortiClient lead to major security risks and learn about the importance of proactive patch management. |
|
|
A vulnerability in Fortinet's FortiClient for Windows is being exploited by the threat actor BrazenBamboo through a malware framework called DEEPDATA to steal VPN credentials. Discovered by Volexity in July 2024, DEEPDATA is a post-exploitation tool targeting Windows to gather various sensitive data, including application passwords and communication app data. It includes a DLL loader to decrypt and launch plugins, one of which exploits the FortiClient flaw to extract VPN credentials. Despite being reported, the flaw remains unpatched. DEEPDATA, along with DEEPPOST and LightSpy, enhance BrazenBamboo's cyber espionage capabilities. LightSpy, linked to China-linked APT41, shares code similarities with DEEPDATA, hinting at a coordinated development effort, possibly by government-associated entities. |
Risks: Zero-Day, Sensitive Data, Patch Management, Malware CVEs: N/A |
|
Keywords: Fortinet, FortiClient, DEEPDATA, VPN Credentials, BrazenBamboo, Zero-Day, APT41, Malware Affected: Fortinet, FortiClient, Windows, WhatsApp, Telegram, Signal, WeChat, LINE, QQ, Skype, Microsoft Outlook, DingDing, Feishu, KeePass |
|
| Read More | |
|
2024-11-17 Retail and Tech Sectors Face Highest Cyber Attack RisksNew opportunity - companies in retail and technology industries are under threat. Time to get out your rolodex. |
|
|
The investigation by NordStellar into nearly 2,000 data breaches over the past two years reveals that retail and technology sectors are the prime targets for cybercriminals, with 95 and 56 attacks respectively. Business services, internet services, IT consulting, and software development also face significant risks. Geographically, US companies are the most targeted, followed by firms in India and the UK. Small and medium businesses are particularly vulnerable, comprising 72% of breached firms, likely due to underestimating their value to hackers. Additionally, 85% of affected businesses are private companies, highlighting their susceptibility to cyber threats. |
Risks: Weak or Compromised Credentials, Other: Broad Attack Methods CVEs: N/A |
|
Keywords: Retail Sector, Technology Sector, Data Breaches, Small and Medium Businesses, Cybercrime Trends Affected: Retail sector, Technology sector, Business services, Internet and web services, IT services and consulting, Software development, Computer hardware development, Entertainment, Education, Finance |
|
| Read More | |
|
2024-11-16 Critical Vulnerability in Palo Alto Networks PAN-OS Under Active ExploitationNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
Palo Alto Networks disclosed a zero-day vulnerability in its PAN-OS firewall management interface, which is actively exploited to deploy web shells, granting attackers persistent access. The vulnerability has a critical CVSS score of 9.3 and allows unauthenticated remote command execution, though severity drops if interface access is restricted. Patches were released for other related vulnerabilities (CVE-2024-9474 and CVE-2024-0012), which allow privilege escalation and authentication bypass. These vulnerabilities have been added to the CISA's Known Exploited Vulnerabilities catalog, requiring remediation by December 9, 2024. Palo Alto is investigating the exploitation under "Operation Lunar Peek" and advises immediate securing of the management interface. |
Risks: Zero-Day, Privilege Escalation, Web App/Website Vulnerability, Malware CVEs: CVE-2024-5910; CVE-2024-9463; CVE-2024-9465; CVE-2024-9474; CVE-2024-0012 |
|
Keywords: Palo Alto Networks, PAN-OS, Zero-Day, Firewall Vulnerability, Remote Command Execution, Web Shell Affected: Palo Alto Networks, PAN-OS |
|
| Read More | |
|
2024-11-15 Chinese Hackers Breach Telecom Providers in Espionage CampaignNew opportunity - telecommunications industry is under threat. Time to get out your rolodex. |
|
|
Chinese hackers have executed a significant cyberespionage campaign targeting telecommunications providers, as confirmed by the US government agencies CISA and FBI. This campaign involved compromising networks to steal call records, spy on individuals, and gather sensitive data, primarily affecting those involved in government or political activities. The alert follows reports of similar breaches in major US broadband providers and raises concerns about the broader implications of such cyber threats on national security. |
Risks: Sensitive Data, State-Sponsored Hackers CVEs: |
|
Keywords: Telecommunications, Cyber Espionage, China, Network Breach, Call Records, State-Sponsored Hackers Affected: Telecommunications providers, AT&T, Verizon, Lumen Technologies, US internet service providers, Singtel |
|
| Read More | |
|
2024-11-15 Critical Vulnerabilities in Palo Alto Networks Software Actively ExploitedNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
CISA has identified two critical vulnerabilities in Palo Alto Networks Expedition software that are currently being exploited in the wild, allowing attackers to execute arbitrary OS commands and access sensitive data. These flaws could lead to severe security breaches, including exposure of usernames, passwords, and firewall configurations. Palo Alto Networks has issued security patches and is actively addressing reports of exploitation, urging users to secure exposed interfaces and prepare for upcoming fixes and threat prevention measures. |
Risks: Web App/Website Vulnerability, Sensitive Data, Patch Management CVEs: CVE-2024-9463; CVE-2024-9465 |
|
Keywords: Palo Alto Networks, Expedition, Vulnerabilities, CVE-2024-9463, CVE-2024-9465, Command Injection, SQL Injection Affected: Palo Alto Networks Expedition, PAN-OS firewalls |
|
| Read More | |
|
2024-11-15 WordPress Plugin Vulnerability Exposes Millions to Security RisksLearn about the crucial role of regular updates and security practices in preventing WordPress plugin vulnerabilities. |
|
|
A critical vulnerability in the popular WordPress plugin, Really Simple Security, has exposed over 4 million websites to potential hacking. The flaw, affecting versions 9.0.0 through 9.1.1.1, allows attackers to bypass authentication and gain full administrative access, posing a risk of complete site compromise. The vulnerability was discovered on November 6, 2024, and patches were released by the developer by November 14. Website owners are urged to ensure their installations are updated to version 9.1.2 or newer to mitigate the risk. This incident highlights the importance of maintaining updated plugins and vigilant security practices in the WordPress environment. |
Risks: Patch Management, Web App/Website Vulnerability, Open Source, Weak or Compromised Credentials CVEs: CVE-2024-10924 |
|
Keywords: WordPress, Really Simple Security, Plugin Vulnerability, Authentication Bypass, CVE-2024-10924 Affected: WordPress, Really Simple Security plugin |
|
| Read More | |
|
2024-11-15 SHJCoop Data Breach Exposes User InformationLearn about the critical need for robust security measures in e-commerce platforms to protect against data breaches and identity theft risks. |
|
|
A data breach at SHJCoop, a UAE-based cooperative platform, has exposed sensitive user information, including personal and potentially financial details. This incident highlights the security vulnerabilities of e-commerce platforms and the risks users face, such as identity theft and fraud. The leaked data has reportedly been uploaded to dark web forums, prompting calls for enhanced security measures like stronger encryption and regular audits to prevent future breaches. |
Risks: Sensitive Data, Web App/Website Vulnerability CVEs: |
|
Keywords: SHJCoop, data breach, user data exposure, e-commerce security, identity theft risk Affected: SHJCoop |
|
| Read More | |
|
2024-11-15 Fortinet Fixes Privilege Escalation Vulnerability in VPN SoftwareNeed some ammo against Fortinet? This article highlights vulnerabilities in their VPN software that could be critical for prospects considering robust security solutions. |
|
|
Fortinet has released an update to fix a vulnerability in its VPN application that could allow unauthorized users or malware to gain elevated privileges by altering SYSTEM-level registry keys. Although this flaw has not yet been actively exploited, users are advised to update to the latest version, FortiClient 7.4.1, which addresses these security issues. |
Risks: Privilege Escalation, Patch Management CVEs: CVE-2024-50564 |
|
Keywords: Fortinet, VPN vulnerability, Privilege escalation, FortiClient, CVE-2024-50564 Affected: FortiClient |
|
| Read More | |
|
2024-11-15 High-Severity Flaw in PostgreSQL Allows Code Execution via Environment VariablesLearn about the importance of patch management and how PostgreSQL vulnerabilities can impact database security. |
|
|
Researchers have identified a high-severity vulnerability in PostgreSQL that allows unprivileged users to manipulate environment variables, potentially enabling code execution or information disclosure. The flaw is linked to the incorrect control of environment variables in PostgreSQL's PL/Perl, which could lead to severe security issues. Users are urged to apply patches and restrict extensions and permissions to mitigate the risk. |
Risks: Open Source, Privilege Escalation, Patch Management CVEs: CVE-2024-10979 |
|
Keywords: PostgreSQL, Vulnerability, Code Execution, Environment Variables, Database Security Affected: PostgreSQL |
|
| Read More | |
|
2024-11-14 2024 Verizon Report Highlights Ransomware, Human Error, and Phishing ThreatsWant to highlight the growing threat landscape and the importance of comprehensive security solutions? This article provides insights into the rise of ransomware, extortion, and the alarming speed of phishing attacks. |
|
|
The 2024 Verizon Data Breach Investigations Report reveals that ransomware and extortion techniques constitute a significant portion of data breaches, with a notable increase in pure extortion attacks. The human element remains a major factor in breaches, while third-party and supply chain vulnerabilities have seen a marked rise, largely due to zero-day exploits. Errors in data handling are more prevalent than previously recognized, accounting for 28% of breaches. The report also highlights the alarming speed at which phishing attacks succeed, with users falling for them in less than a minute. Financially motivated attacks continue to rely heavily on ransomware and extortion, with business email compromise also contributing to substantial financial losses. |
Risks: Ransomware, Extortion, Human Error, Supply Chain, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: |
|
Keywords: Ransomware, Extortion, Human Error, Phishing, Data Breach, Verizon Report Affected: |
|
| Read More | |
|
2024-11-14 2023's Most Exploited Cyber Vulnerabilities RevealedLearn about the importance of proactive patch management and secure practices to protect against frequently exploited vulnerabilities. |
|
|
The 2023 Top Routinely Exploited Vulnerabilities report, coauthored by cybersecurity agencies from multiple countries, outlines the most frequently exploited vulnerabilities by malicious actors, highlighting a rise in zero-day attacks compared to 2022. The report emphasizes the need for secure practices among vendors, developers, and organizations to mitigate these risks. It lists the top 15 vulnerabilities exploited, affecting a range of products from Citrix, Cisco, Fortinet, Atlassian, and others, stressing the importance of timely patching and robust security measures. Recommendations include adopting secure design principles, implementing centralized patch management, and enhancing access controls to protect against these threats. |
Risks: Zero-Day, Privilege Escalation, Web App/Website Vulnerability, Patch Management CVEs: CVE-2023-3519; CVE-2023-4966; CVE-2023-20198; CVE-2023-20273; CVE-2023-27997; CVE-2023-34362; CVE-2023-22515; CVE-2021-44228; CVE-2023-2868; CVE-2022-47966; CVE-2023-27350; CVE-2020-1472; CVE-2023-42793; CVE-2023-23397; CVE-2023-49103 |
|
Keywords: Zero-Day, Exploited Vulnerabilities, Patch Management, Citrix, Cisco, Fortinet, Log4Shell, Cyber Threats Affected: Citrix NetScaler ADC, NetScaler Gateway, Cisco IOS XE Web UI, Fortinet FortiOS, FortiProxy SSL-VPN, Progress MOVEit Transfer, Atlassian Confluence Data Center, Atlassian Confluence Server, Apache Log4j, Barracuda Networks Email Security Gateway, Zoho ManageEngine, PaperCut MF, PaperCut NG, Microsoft Netlogon, JetBrains TeamCity, Microsoft Office Outlook, ownCloud graphapi |
|
| Read More | |
|
2024-11-14 Google Patches Vertex AI Vulnerabilities Exposing Enterprise ModelsNeed some ammo against Google Cloud? Have a customer or prospect that uses Google Cloud? This article is for you! |
|
|
Google recently addressed two significant security vulnerabilities in its Vertex AI platform, which is used for developing and deploying large language models. These flaws could have allowed attackers to access proprietary enterprise models. The vulnerabilities involved privilege escalation in custom jobs and model exfiltration through malicious models, posing a risk of model-to-model infection. Although the issues have been resolved, they underscore the potential dangers of AI manipulation and the importance of stringent access controls and separation of development and production environments to protect sensitive AI assets. |
Risks: Privilege Escalation, Over Permissive Roles, Cloud Service Provider Flaw, Malware CVEs: |
|
Keywords: Google Cloud, Vertex AI, AI Security, Model Exfiltration, Privilege Escalation Affected: Google Vertex AI, Google Cloud Platform |
|
| Read More | |
|
2024-11-13 Microsoft Patches Critical NTLM and Task Scheduler VulnerabilitiesLearn about the critical importance of timely patch management and how vulnerabilities in widely-used systems can impact your security posture. |
|
|
Microsoft's November 2024 Patch Tuesday update addresses 90 security vulnerabilities, including two actively exploited flaws in Windows NT LAN Manager (NTLM) and Task Scheduler. These vulnerabilities, along with others affecting systems such as Azure CycleCloud and .NET, involve remote code execution and privilege escalation risks. Among the vulnerabilities, four are deemed Critical, with 52 allowing remote code execution. Additionally, Microsoft fixed flaws in its Chromium-based Edge browser. The update also highlights a cryptographic protocol issue in Windows Kerberos and a remote code execution flaw in OpenSSL. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added the exploited NTLM and Task Scheduler vulnerabilities to its Known Exploited Vulnerabilities catalog. |
Risks: Zero-Day, Privilege Escalation, Patch Management, Remote Code Execution CVEs: CVE-2024-43451; CVE-2024-49039; CVE-2024-21410; CVE-2024-38021; CVE-2024-49019; CVE-2024-43498; CVE-2024-43639; CVE-2024-43602; CVE-2024-5535 |
|
Keywords: Microsoft, NTLM vulnerability, Task Scheduler, Patch Tuesday, Remote Code Execution, Privilege Escalation Affected: Windows NT LAN Manager, Task Scheduler, Azure CycleCloud, .NET, Visual Studio, Windows Kerberos, OpenSSL, Active Directory Certificate Services, Chromium-based Edge |
|
| Read More | |
|
2024-11-13 Form I-9 Compliance Data Breach Exposes 193,000 Individuals' InformationWant to emphasize the risks and costs of inadequate data protection? Learn from Form I-9 Compliance's massive data breach incident. |
|
|
Form I-9 Compliance, a company providing employee eligibility verification solutions, experienced a significant data breach initially affecting around 27,000 individuals, which later escalated to over 193,000 people. The breach, detected in April but occurring in February, exposed sensitive information such as names and Social Security numbers. Impacted individuals are being offered free identity theft protection and credit monitoring services as part of the company's response to the incident. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Data Breach, Form I-9 Compliance, Identity Theft, Personal Information, Cybersecurity Incident Affected: Form I-9 Compliance |
|
| Read More | |
|
2024-11-13 Hot Topic Data Breach Exposes 57 Million Customer RecordsLearn about the critical role of multi-factor authentication and proactive security measures in preventing costly data breaches. |
|
|
In October 2024, fashion retailer Hot Topic experienced a significant data breach impacting approximately 57 million customers. The compromised information included personal details such as names, addresses, phone numbers, birth dates, and partial credit card data. The breach was discovered when a threat actor claimed to have hacked Hot Topic and related brands, attempting to sell the stolen data and extort the company. The breach likely stemmed from password-stealing malware and the absence of multi-factor authentication on a Snowflake account. The situation is under investigation, with updates pending. |
Risks: Sensitive Data, Malware, Weak or Compromised Credentials, Misconfiguration CVEs: |
|
Keywords: Hot Topic, Data Breach, Customer Data, Multi-Factor Authentication, Password-Stealing Malware, Snowflake, Personal Information Leak Affected: Hot Topic, BoxLunch, Torrid, Snowflake |
|
| Read More | |
|
2024-11-13 SAP Releases Critical Patches for Web Dispatcher and PDCE VulnerabilitiesLearn about the critical importance of timely patch management to protect against severe vulnerabilities and safeguard your clients' SAP environments. |
|
|
SAP's November 2024 security updates address critical vulnerabilities, including a high-severity cross-site scripting flaw in Web Dispatcher that could lead to remote code execution and full system compromise. The updates also include patches for a missing authorization check in Product Design Cost Estimating, which poses a confidentiality risk, and several medium-severity vulnerabilities in other SAP components. While no active exploitation has been reported, the critical nature of these vulnerabilities highlights the importance of timely patch application to safeguard against potential threats. |
Risks: Patch Management, Web App/Website Vulnerability CVEs: CVE-2024-47590; CVE-2024-39592 |
|
Keywords: SAP, Web Dispatcher, PDCE, Vulnerability, XSS, Remote Code Execution, Patch Management Affected: Web Dispatcher, SAP Product Design Cost Estimating, Host Agent, NetWeaver, Cash Management, Bank Account Management |
|
| Read More | |
|
2024-11-13 Malicious Python Package Fabrice Steals AWS Credentials from PyPIGot you some real good FUD, learn about the dangers of supply chain attacks through malicious open source packages. |
|
|
A malicious Python package named "Fabrice" has been active on the PyPI repository since 2021, exploiting the trust of developers in the legitimate "Fabric" SSH automation library by typosquatting. With over 37,000 downloads, "Fabrice" has been used to exfiltrate AWS credentials, creating backdoors and executing platform-specific scripts. The attack employs obfuscated URLs, encoded payloads, and a VPN-based proxy server for covert data exfiltration, reflecting a strategic approach typical of advanced threat actors. This long-term presence highlights a trend where attackers prioritize persistent access and gradual collection of valuable data, particularly targeting AWS credentials due to their critical role in cloud infrastructures. The exploitation of non-human identities (NHIs) is also a significant concern, as it can take up to a year for companies to identify and mitigate compromised identities. This underscores the need for rapid detection and response to abnormal behaviors related to NHIs to prevent further credential theft. |
Risks: Sensitive Data, Supply Chain, Open Source, Weak or Compromised Credentials CVEs: |
|
Keywords: PyPI, AWS credentials, supply chain attack, Fabric library, typosquatting Affected: PyPI, AWS, Fabric, SSH |
|
| Read More | |
|
2024-11-13 Amazon Employee Data Exposed in MOVEit HackNeed some ammo against Amazon AWS? Have a customer or prospect that uses AWS? This article is for you! |
|
|
Amazon has confirmed that some of its employee data was compromised due to a MOVEit hack that exploited a vulnerability in Progress Software's file transfer software, impacting nearly 2,800 organizations. The breach, primarily attributed to the Cl0p ransomware group, involved a third-party property management vendor, not Amazon or AWS systems directly. Exposed data includes work contact information such as emails and phone numbers, but no sensitive personal data like Social Security or financial information was affected. The hacker claims to possess a database with around 2.8 million entries, although the exact number of affected employees is unknown. |
Risks: Zero-Day, Sensitive Data, Supply Chain, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Amazon, MOVEit, Data Breach, Cl0p Ransomware, Third-Party Vendor Affected: Amazon, MOVEit, Progress Software |
|
| Read More | |
|
2024-11-13 GitLoker Introduces Goissue Tool Targeting GitHub Developers and Supply ChainsGot you some real good FUD, learn about the dangers of supply chain attacks and how automated tools like Goissue can threaten corporate networks. |
|
|
Cybercriminals from the Gitloker group have introduced a phishing tool called Goissue, designed to target GitHub developers and corporate supply chains. This tool automates the extraction of email addresses from GitHub repositories and facilitates large-scale phishing campaigns that can lead to source code theft, supply chain attacks, and breaches of corporate networks. Key features of Goissue include customizable email templates and token management, with the ability to target entire organizations. Experts warn of the growing threat as attackers use such sophisticated tools to compromise developer credentials and gain unauthorized access to private repositories. |
Risks: Git/Repo Breach, Supply Chain, Weak or Compromised Credentials CVEs: |
|
Keywords: GitLoker, Goissue, GitHub, Phishing Tool, Supply Chain Attack, Developer Security Affected: GitHub, Corporate Supply Chains |
|
| Read More | |
|
2024-11-13 Ahold Delhaize Faces Cybersecurity Incident Affecting US BrandsLearn how a major food retailer's cybersecurity incident highlights the importance of proactive threat mitigation and detection strategies in protecting retail networks. |
|
|
Ahold Delhaize, a major global food retailer, has experienced a cybersecurity incident affecting its US network, impacting brands like Giant Food and Hannaford, with the latter's ecommerce portal being offline due to server issues. The company has implemented mitigation measures and launched an investigation, involving law enforcement, although details about the incident type or potential data compromise remain undisclosed. This response suggests the possibility of a ransomware attack. |
Risks: Ransomware, Other: Network Incident CVEs: |
|
Keywords: Ahold Delhaize, Giant Food, Hannaford, Ransomware, Retail Cybersecurity, US Network Incident Affected: Giant Food, Hannaford, Ahold Delhaize, Food Lion, Stop & Shop, The Giant Company |
|
| Read More | |
|
2024-11-13 OvrC Platform Vulnerabilities Expose IoT Devices to Remote Code ExecutionLearn about the critical importance of securing cloud-managed IoT devices and how vulnerabilities can expose vast networks to remote attacks. |
|
|
A recent security analysis of the OvrC cloud platform, used for managing IoT devices, revealed ten vulnerabilities that could allow attackers to execute code remotely on connected devices. These vulnerabilities affect over 500,000 installations of OvrC solutions and could be exploited to impersonate devices, execute arbitrary code, and access sensitive information. Snap One, the company behind OvrC, has addressed these issues with patches released in May 2023 and November 2024. The vulnerabilities underscore the importance of enhancing the security of cloud-managed IoT devices to prevent unauthorized access and potential exploitation. |
Risks: Patch Management, Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2023-28649; CVE-2023-31241; CVE-2023-28386; CVE-2024-50381; CVE-2024-3184; CVE-2024-3186; CVE-2024-3187 |
|
Keywords: IoT vulnerabilities, OvrC platform, remote code execution, Snap One, device security Affected: Snap One, OvrC Platform, EmbedThis GoAhead, Johnson Controls' exacqVision Web Service |
|
| Read More | |
|
2024-11-12 Forth Data Breach Exposes Personal Information of 1.5 Million IndividualsLearn about the critical importance of data protection and the potential business relationships at risk due to data breaches. |
|
|
Debt relief provider Forth disclosed a data breach affecting 1.5 million individuals, compromising sensitive personal information such as names, addresses, dates of birth, and Social Security numbers. The breach, which occurred in May 2024, was identified by July 1, and notifications were sent to affected parties starting November 8. The breach also impacts individuals who were not direct customers of Forth but used Centrex Software, a platform enabling data sharing between businesses. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Data Breach, Forth, Personal Information, Centrex Software, Identity Theft Affected: Forth, Centrex Software |
|
| Read More | |
|
2024-11-12 New Vulnerabilities in Citrix Virtual Apps Allow Remote Code ExecutionLearn about the critical importance of secure configuration and patch management to prevent vulnerabilities in enterprise applications. |
|
|
Researchers have identified security vulnerabilities in Citrix Virtual Apps and Desktop, specifically within the Session Recording component, which could allow unauthenticated remote code execution. These flaws stem from the use of an exposed MSMQ instance and misconfigured permissions that enable exploitation through BinaryFormatter deserialization via HTTP. While these vulnerabilities could lead to privilege escalation and limited remote code execution, successful exploitation requires the attacker to be an authenticated user within the same Active Directory domain and intranet as the session recording server. The core issue lies in the excessive privileges of the MSMQ instance and the insecure deserialization process, highlighting Microsoft's recommendation to avoid using BinaryFormatter with untrusted data. |
Risks: Misconfiguration, Over Permissive Roles, Privilege Escalation CVEs: CVE-2024-8068; CVE-2024-8069 |
|
Keywords: Citrix, Remote Code Execution, CVE-2024-8068, CVE-2024-8069, Session Recording, MSMQ, BinaryFormatter Affected: Citrix Virtual Apps and Desktop, Microsoft Message Queuing, Windows Active Directory |
|
| Read More | |
|
2024-11-12 Tewkesbury Borough Council Faces Backlog After Cyber AttackLearn about the operational impacts of a cyber attack on local government services and the importance of robust cybersecurity measures to prevent service disruptions. |
|
|
Tewkesbury Borough Council experienced a cyber attack that led to the temporary shutdown of all online services, necessitating the redeployment of staff to ensure continued access to services for vulnerable individuals. Although the council has resolved the issue with no data loss, they are now facing a significant backlog of work. The downtime resulted in an increase in planning application backlogs, rising from 238 to 390 by the end of October, highlighting the operational challenges posed by the cyber incident. |
Risks: Other: Service Disruption CVEs: |
|
Keywords: Tewkesbury Borough Council, Cyber Attack, Service Disruption, Local Government, Operational Backlog Affected: Tewkesbury Borough Council |
|
| Read More | |
|
2024-11-12 Unpatched Vulnerabilities in Mazda Infotainment Systems Allow Code ExecutionLearn about the critical importance of securing IoT and automotive systems to prevent potential vulnerabilities from compromising vehicle safety and operations. |
|
|
Vulnerabilities in the infotainment system of several Mazda car models, particularly affecting the Mazda Connect Connectivity Master Unit (CMU), allow attackers to execute arbitrary code with root privileges by exploiting improper input sanitization. These flaws enable a physically present attacker to use a specially crafted USB device to compromise the system, potentially gaining full control over the vehicle's networks and affecting its operation and safety. The vulnerabilities impact Mazda models from 2014 to 2021 and remain unpatched by the manufacturer, posing significant security risks. Exploitation could lead to persistent system compromise, data manipulation, and potential harm to connected devices. |
Risks: Privilege Escalation, Patch Management, Other: Input Sanitization Flaw CVEs: CVE-2024-8355; CVE-2024-8359; CVE-2024-8360; CVE-2024-8358; CVE-2024-8356 |
|
Keywords: Mazda, Infotainment System, Vulnerability, Code Execution, Automotive Security, USB Exploit Affected: Mazda, Visteon, Johnson Controls, Mazda Connect Connectivity Master Unit (CMU) |
|
| Read More | |
|
2024-11-12 Veeam Releases Patch for High-Severity Vulnerability in Backup Enterprise ManagerLearn about the critical importance of patch management to prevent exploitation and ensure your cloud security offerings are up-to-date. |
|
|
Veeam has issued patches for a high-severity vulnerability in its Backup Enterprise Manager that can be remotely exploited without authentication via a man-in-the-middle attack. A hotfix is available for users of version 12.2.0.334, or they can upgrade using the latest ISOs. While there is no current evidence of this vulnerability being actively exploited, Veeam advises immediate application of the patch due to previous instances where patched vulnerabilities were later targeted by threat actors, as seen with a recently exploited critical flaw in the same product line. |
Risks: Patch Management, Man-in-the-Middle Attack CVEs: CVE-2024-40715; CVE-2024-40711 |
|
Keywords: Veeam, Backup Enterprise Manager, CVE-2024-40715, Patch Management, Man-in-the-Middle Attack Affected: Veeam, Backup Enterprise Manager, Veeam Backup & Replication |
|
| Read More | |
|
2024-11-12 Thompson Coburn Data Breach Exposes Over 300,000 Presbyterian Healthcare Patients' InformationLearn about the crucial importance of securing third-party partnerships and protecting sensitive healthcare data to avoid costly breaches. |
|
|
A data breach at law firm Thompson Coburn led to the exposure of sensitive information of over 300,000 patients from Presbyterian Healthcare Services. The breach, detected on May 29, involved unauthorized access to files containing protected health information, including personal identifiers, medical and insurance details. No ransomware group has claimed responsibility, and the law firm has not disclosed further details about the attack. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Data Breach, Healthcare, Thompson Coburn, Presbyterian Healthcare, PHI Exposure, Law Firm Breach Affected: Presbyterian Healthcare Services, Thompson Coburn |
|
| Read More | |
|
2024-11-11 Palo Alto Networks Warns of Potential RCE Vulnerability in PAN-OSNeed some ammo against Palo Alto Networks? This article highlights potential vulnerabilities in their systems. |
|
|
Palo Alto Networks has issued a notice urging users to secure the PAN-OS management interface due to concerns about a potential remote code execution vulnerability. Although specific details of the vulnerability are not yet known, the company advises customers to configure the management interface according to best practices, ensuring access is restricted to trusted internal IPs to minimize risk. Key recommendations include isolating the interface on a dedicated VLAN, using jump servers for access, limiting inbound IP addresses to approved devices, and permitting only secure communication protocols like SSH and HTTPS. |
Risks: Misconfiguration, Inadequate Network Segmentation CVEs: |
|
Keywords: Palo Alto Networks, PAN-OS, Remote Code Execution, Vulnerability, Network Security Affected: Palo Alto Networks, PAN-OS, SSH, HTTPS |
|
| Read More | |
|
2024-11-10 Critical Vulnerabilities Found in Azure AI Content SafetyNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure's AI services? This article is for you! |
|
|
Mindgard researchers discovered critical vulnerabilities in Microsoft's Azure AI Content Safety service, which allowed attackers to bypass security measures and deliver harmful AI-generated content. The vulnerabilities were found in the AI Text Moderation and Prompt Shield guardrails, enabling attackers to use character injection and adversarial machine learning techniques to mislead the model and compromise sensitive data. These flaws significantly reduced the effectiveness of content moderation, posing risks of inappropriate content generation and ethical violations. Organizations are advised to apply security patches and enhance protective measures to safeguard AI applications from such threats. |
Risks: Cloud Service Provider Flaw, Other: Injection CVEs: |
|
Keywords: Azure AI, Microsoft Vulnerability, AI Content Safety, Character Injection, Adversarial Machine Learning Affected: Microsoft Azure |
|
| Read More | |
|
2024-11-10 New Ransomware Tactics Exploit AWS KMS External Key StoreNeed some ammo against AWS? Have a customer or prospect that uses AWS? This article is for you! |
|
|
Recently, a new method for executing ransomware attacks on AWS accounts was discovered, leveraging the AWS Key Management Service (KMS) and its eXternal Key Store (XKS) feature. This feature, introduced in late 2022, allows encryption using external keys stored in on-premises Hardware Security Modules (HSMs). Attackers can exploit this by creating external key stores, gaining control over cryptographic processes, and encrypting data in AWS services like S3 and EC2. However, AWS provides mechanisms to mitigate such attacks, emphasizing that the security of key material lies with HSM owners. Organizations can implement Service Control Policies to restrict certain API calls and prevent unauthorized key store creation. |
Risks: Privilege Escalation, Cloud Service Provider Flaw CVEs: |
|
Keywords: AWS, Ransomware, Key Management Service, External Key Store, Encryption, HSM Affected: AWS |
|
| Read More | |
|
2024-11-10 Vulnerability in AWS CDK Allows Potential Account TakeoverNeed some ammo against AWS? Have a customer or prospect using AWS? This article is for you! |
|
|
In June 2024, a vulnerability in the AWS Cloud Development Kit (CDK) was identified, which could allow attackers to gain administrative access to AWS accounts through predictable S3 bucket names. AWS addressed the issue by updating CDK to version v2.149.0, requiring users to upgrade and re-run the `cdk bootstrap` command to secure their environments. The vulnerability affects about 1% of CDK users, and AWS has taken steps to mitigate the risk by ensuring assets are only uploaded to buckets within the user's account. Users are advised to treat AWS Account IDs as sensitive and use unique naming strategies for S3 buckets. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Supply Chain, Cloud Service Provider Flaw CVEs: |
|
Keywords: AWS CDK, Account Takeover, Cloud Security, S3 Bucket Vulnerability, Infrastructure as Code Affected: AWS Cloud Development Kit |
|
| Read More | |
|
2024-11-09 Critical Vulnerability in Cisco's Industrial Wireless Systems Exposes Admin AccessNeed some ammo against Cisco? This article highlights a critical vulnerability in their industrial wireless systems, emphasizing the importance of robust security solutions. |
|
|
Cisco has issued a critical alert about a severe vulnerability in its Ultra-Reliable Wireless Backhaul systems, potentially allowing remote attackers to gain unauthorized admin-level access. This flaw affects several Catalyst access points and wireless clients used in industrial settings, with a maximum severity rating due to the ease of exploitation and significant impact. Cisco urges users to apply an emergency patch immediately, as no workarounds are available. Fortunately, there have been no reports of the vulnerability being exploited yet, highlighting the importance of strong cybersecurity practices in critical infrastructure environments. |
Risks: Privilege Escalation, Web App/Website Vulnerability, Patch Management CVEs: CVE-2024-20418 |
|
Keywords: Cisco, CVE-2024-20418, Industrial Wireless, Admin Access, Vulnerability Affected: Cisco, Unified Industrial Wireless Software, Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, Catalyst IW9167E Heavy Duty Access Points |
|
| Read More | |
|
2024-11-09 Malicious npm Packages Target Roblox Users with Stealer MalwareGot you some real good FUD, learn about the dangers of supply chain attacks in open-source ecosystems. |
|
|
A recent attack on the npm package repository introduced malicious JavaScript libraries targeting Roblox users with stealer malware, specifically Skuld and Blank-Grabber. The attack involved deceptive packages masquerading as legitimate ones, such as `node-dlls` and `rolimons-api`, to download and execute malware that exfiltrates data through Discord and Telegram. The threat actor utilized GitHub to host these malicious binaries. The surge in Roblox's popularity has made it a target for such attacks, emphasizing the need for developers to verify package authenticity and maintain robust security practices to mitigate supply chain threats. |
Risks: Malware, Supply Chain, Open Source, Git/Repo Breach CVEs: |
|
Keywords: Roblox, npm, supply chain attack, stealer malware, Skuld, Blank-Grabber Affected: Roblox, npm |
|
| Read More | |
|
2024-11-08 Critical Vulnerabilities Found in Palo Alto Networks Expedition and CyberPanelNeed some ammo against Palo Alto Networks and insights into critical vulnerabilities? This article is for you! |
|
|
CISA has added two critical security vulnerabilities to its Known Exploited Vulnerabilities catalog, highlighting their active exploitation. The first flaw, affecting Palo Alto Networks Expedition, allows unauthorized access to admin accounts and impacts all versions prior to 1.2.92, which was patched in July 2024. The second, a more severe vulnerability in CyberPanel, enables remote attackers to execute commands as root and has been exploited to spread ransomware across thousands of systems. |
Risks: Patch Management, Web App/Website Vulnerability, Malware, Privilege Escalation, Weak or Compromised Credentials CVEs: CVE-2024-5910; CVE-2024-51567 |
|
Keywords: Palo Alto Networks, Expedition, CyberPanel, CVE-2024-5910, CVE-2024-51567, Ransomware, Vulnerability Exploitation Affected: Palo Alto Networks Expedition, CyberPanel |
|
| Read More | |
|
2024-11-08 HPE Releases Critical Updates for Aruba Access Points Due to Severe VulnerabilitiesLearn about the critical need for timely patch management to protect against severe vulnerabilities in network devices. |
|
|
Hewlett Packard Enterprise has released critical updates for its Instant AOS-8 and AOS-10 software to address severe vulnerabilities in Aruba Networking Access Points. These vulnerabilities could allow remote attackers to execute unauthorized command injections. The update also fixes additional security issues that could enable remote command execution and unauthorized file access. Affected software versions include AOS-10.4.x.x and Instant AOS-8.x.x, with recommendations to update to newer versions to mitigate risks. Workarounds involve restricting access to certain ports and interfaces. No active exploitation has been reported, but timely updates are advised to maintain security. |
Risks: Patch Management, Other: Command Injection CVEs: CVE-2024-42509; CVE-2024-47460; CVE-2024-47461; CVE-2024-47462; CVE-2024-47463; CVE-2024-47464 |
|
Keywords: HPE, Aruba, Access Points, Vulnerabilities, Security Updates, Command Injection Affected: Hewlett Packard Enterprise, Aruba Networking Access Points |
|
| Read More | |
|
2024-11-07 Ariel University Data Breach Exposes 30,000 RecordsLearn about the growing threat landscape in educational institutions and the vital need for robust data protection strategies. |
|
|
Hackers have allegedly breached Ariel University, exposing the personal data of 30,000 students and applicants, with an additional 180,000 records purportedly for sale on the dark web. This incident highlights the increasing trend of cybercriminals targeting educational institutions, which hold vast amounts of sensitive data. The breach underscores the vulnerabilities in data security within higher education, particularly as universities often depend on third-party vendors for data management, thereby amplifying their risk of exposure. Such breaches not only compromise personal information but also harm the reputations of the affected institutions. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Data Breach, Ariel University, Educational Institutions, Cyberattack, Dark Web Affected: Ariel University |
|
| Read More | |
|
2024-11-07 Critical Vulnerability in Cisco Wireless Access Points Allows Root Command ExecutionNeed some ammo against Cisco? This article highlights their vulnerabilities, offering insights into their security challenges. |
|
|
Cisco has addressed a critical vulnerability in its Ultra-Reliable Wireless Backhaul access points, which could allow attackers to execute commands with root privileges. This flaw, found in the web-based management interface of Cisco's Unified Industrial Wireless Software, can be exploited through low-complexity attacks without requiring user interaction. The vulnerability affects several Catalyst access points and is due to improper input validation. Cisco has also recently fixed other security issues, including a denial-of-service flaw and another command injection vulnerability, highlighting the ongoing need for vigilance against OS command injection threats. |
Risks: Privilege Escalation, Web App/Website Vulnerability CVEs: CVE-2024-20418; CVE-2024-20399; CVE-2024-3400; CVE-2024-21887 |
|
Keywords: Cisco, Vulnerability, Root Access, Wireless Access Points, Command Injection, CVE-2024-20418 Affected: Cisco, Ultra-Reliable Wireless Backhaul access points, Unified Industrial Wireless Software, Catalyst IW9165D Heavy Duty Access Points, Catalyst IW9165E Rugged Access Points and Wireless Clients, Catalyst IW9167E Heavy Duty Access Points, Cisco ASA, Firepower Threat Defense (FTD) software |
|
| Read More | |
|
2024-11-07 VEILDrive Attack Exploits Microsoft Services to Distribute MalwareNeed some FUD? Learn how attackers are exploiting trusted Microsoft services to bypass conventional defenses and infiltrate critical infrastructures. |
|
|
The VEILDrive attack leverages legitimate Microsoft services such as Teams, SharePoint, Quick Assist, and OneDrive to evade detection and distribute malware. Discovered in September 2024, the campaign targets critical infrastructure by exploiting trusted infrastructures of compromised organizations for spear-phishing and malware storage. The attackers impersonate IT staff to gain remote access, using pre-existing user accounts and SharePoint links to disseminate malware-laden ZIP files. The Java-based malware connects to a OneDrive account for command-and-control operations, employing PowerShell and Azure virtual machines for further execution. This approach complicates detection and bypasses conventional defenses due to its reliance on familiar SaaS platforms. |
Risks: Malware, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: |
|
Keywords: VEILDrive, Microsoft Teams, SharePoint, OneDrive, Spear-Phishing, Quick Assist, Cloud Exploitation Affected: Microsoft Teams, Microsoft SharePoint, Microsoft Quick Assist, Microsoft OneDrive, Java, Microsoft Graph API, Azure virtual machine, OneDrive account |
|
| Read More | |
|
2024-11-07 Microlise Data Breach Disrupts DHL and Serco ServicesDiscover the critical need for robust supply chain cybersecurity as major companies face disruptions and financial impacts due to breaches. |
|
|
Microlise, a telematics technology company, experienced a data breach impacting employee data, but not customer data, leading to a 16% drop in its share price. The breach, disclosed on October 31, 2024, affected major clients like DHL and Serco, disrupting services such as delivery tracking and security systems. Although no specific cybercrime group has been identified, experts suggest it resembles a ransomware attack, highlighting the risks in supply chain security. Microlise is working with cybersecurity experts to mitigate the threat and expects full service resumption soon, while complying with regulatory notification requirements. |
Risks: Supply Chain, Ransomware, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Microlise, Data Breach, Ransomware, Supply Chain Attack, Telematics, DHL, Serco Affected: Microlise, DHL, Serco, Nisa Group |
|
| Read More | |
|
2024-11-06 Critical Vulnerabilities Found in Rockwell ThinManager SoftwareLearn about the critical importance of securing industrial control systems and the potential impact of unpatched vulnerabilities. |
|
|
Rockwell Automation has disclosed critical vulnerabilities in its FactoryTalk ThinManager software, a vital component in industrial control systems. These vulnerabilities could allow attackers to manipulate databases or cause denial-of-service (DoS) conditions, posing serious risks to industrial environments. Affected ThinManager versions range from 11.2.0 to 14.0.0. Rockwell recommends updating to the latest software versions, hardening network security by limiting communication on specific ports, and implementing robust security practices. The Cybersecurity and Infrastructure Security Agency (CISA) also advises prioritizing updates and securing networks to mitigate potential impacts on critical industrial systems. |
Risks: Patch Management, Inadequate Network Segmentation CVEs: CVE-2024-10386; CVE-2024-10387 |
|
Keywords: Rockwell Automation, ThinManager, Industrial Control Systems, Vulnerabilities, Denial-of-Service, Database Manipulation Affected: FactoryTalk ThinManager, Rockwell Automation |
|
| Read More | |
|
2024-11-06 Schneider Electric hit by ransomware via Atlassian Jira breachLearn about the importance of securing project management tools and the potential impacts of neglecting ransomware threats. |
|
|
Schneider Electric is investigating a ransomware breach where the Hellcat group claims to have stolen over 40 GB of compressed data, including sensitive customer and operational information. The attackers allegedly accessed Schneider's infrastructure through its Atlassian Jira system and demanded a humorous ransom of $125,000 in baguettes. Despite the joke, the breach is serious, with critical data, including projects and user information, compromised. This marks Schneider Electric's third breach in less than two years, following incidents with Cactus ransomware and the CL0P ransomware crew. |
Risks: Sensitive Data, Web App/Website Vulnerability CVEs: |
|
Keywords: Schneider Electric, Ransomware, Hellcat group, Atlassian Jira, Data Breach Affected: Schneider Electric, Atlassian Jira |
|
| Read More | |
|
2024-11-06 36 Vulnerabilities Found in IBM Security Verify AccessLearn about the critical security gaps in IBM's authentication systems and discover how CloudGuard can offer superior protection and risk mitigation strategies. |
|
|
A recent security analysis of IBM Security Verify Access identified 36 vulnerabilities, including remote code execution, authentication bypass, and privilege escalation issues. Attackers could exploit these flaws through man-in-the-middle attacks and by accessing internal networks using IBM’s ISVA appliances and Docker images. Key issues include hardcoded encryption keys, outdated OpenSSL packages, and vulnerable back-end APIs. While most vulnerabilities were addressed in software updates by June 2024, IBM has yet to patch some, advising customers to apply network restrictions and security best practices to mitigate risks. Organizations using ISVA may face threats such as denial-of-service attacks and compromised authentication infrastructure if these vulnerabilities are not properly managed. |
Risks: Privilege Escalation, Hardcoded Secrets, API Vulnerability, Patch Management, Supply Chain CVEs: |
|
Keywords: IBM Security Verify Access, vulnerabilities, remote code execution, authentication bypass, privilege escalation, Docker images Affected: IBM Security Verify Access |
|
| Read More | |
|
2024-11-06 Saint Xavier University Data Breach Affects Over 210,000 IndividualsLearn about the crucial role of proactive threat detection and response in preventing data breaches, as demonstrated by the Saint Xavier University incident. |
|
|
Saint Xavier University experienced a data breach in July 2023, affecting over 210,000 individuals by compromising personal information such as names, Social Security numbers, and financial data. The breach was discovered on July 21, 2023, but unauthorized access occurred weeks earlier. The university's investigation and notification process took considerable time, with formal notifications starting on October 30, 2024. Although the type of attack was not specified by the university, the Alphv/BlackCat ransomware group claimed responsibility for the incident in August 2023. |
Risks: Sensitive Data, Ransomware CVEs: |
|
Keywords: Data Breach, Saint Xavier University, Ransomware, Alphv/BlackCat, Personal Information Compromise Affected: Saint Xavier University |
|
| Read More | |
|
2024-11-05 Critical Vulnerabilities Found in Ollama AI FrameworkLearn about the critical vulnerabilities in open-source AI frameworks and how CloudGuard can help secure your deployments from similar threats. |
|
|
Researchers have uncovered six critical vulnerabilities in the Ollama AI framework, which could be exploited to perform denial-of-service attacks, model theft, and poisoning. These flaws, found in an open-source application used to deploy large language models on various operating systems, could allow attackers to execute malicious actions with a single HTTP request. Despite fixes being released for some vulnerabilities, the exposure of Ollama's endpoints to the internet remains a significant risk, with over 9,800 instances globally, many of which are vulnerable. Users are advised to restrict endpoint access to mitigate potential exploits. |
Risks: API Vulnerability, Open Source, Shadow IT/Exposed Assets CVEs: CVE-2024-39719; CVE-2024-39720; CVE-2024-39721; CVE-2024-39722 |
|
Keywords: Ollama, AI Framework, Denial-of-Service, Model Theft, Vulnerabilities Affected: Ollama AI framework |
|
| Read More | |
|
2024-11-05 Telecom Companies in East Asia Targeted by Hackers Selling Network AccessNew opportunity - telecom companies in China and Taiwan are under threat. Time to get out your rolodex. |
|
|
Hackers are reportedly selling root access to a telecom company in China or Taiwan for $4,000, posing significant threats to corporate data and customer privacy. Such access could lead to data breaches, service disruptions, and potential espionage, especially amid geopolitical tensions in East Asia. This incident underscores the increasing trend of cyberattacks on telecommunications companies globally, including recent targets like U.S. firms AT&T and Verizon. Experts recommend enhanced cybersecurity measures and regular audits to mitigate these risks. |
Risks: Sensitive Data, Privilege Escalation, Weak or Compromised Credentials CVEs: |
|
Keywords: Telecom Security, Hacker Access Sale, East Asia Cyber Threats, Network Infrastructure Risk, China Taiwan Cybersecurity Affected: telecom company in China, telecom company in Taiwan, Chunghwa Telecom, AT&T, Verizon |
|
| Read More | |
|
2024-11-05 Nokia's Data Compromised via Third-Party Vendor BreachDiscover the critical role of securing third-party vendors and the risks of default credentials to prevent data breaches. |
|
|
Nokia is currently investigating a security breach after a hacker, known as IntelBroker, claimed to have accessed and stolen source code from a third-party contractor associated with Nokia. The hacker is reportedly selling this data, which includes sensitive information such as SSH keys, RSA keys, BitBucket logins, and other credentials. The breach allegedly occurred through a SonarQube server that was accessed using default credentials, enabling the download of various Python projects, including those related to Nokia. |
Risks: Sensitive Data, Misconfiguration, Hardcoded Secrets, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: |
|
Keywords: Nokia, Data Breach, Third-Party Vendor, IntelBroker, SonarQube, Default Credentials Affected: Nokia, SonarQube, BitBucket, SMTP, SSH, RSA |
|
| Read More | |
|
2024-11-04 Backdoor Malware Targets Sophos and Fortinet DevicesNeed some ammo against Sophos and Fortinet? This article is for you! |
|
|
The UK's National Cyber Security Centre has identified a sophisticated backdoor, named Pygmy Goat, on hacked Sophos XG firewall devices, which is capable of targeting a broader range of Linux-based network devices. This malware disguises malicious traffic as legitimate SSH connections and uses encrypted ICMP packets for covert communication. Its clean and extensible code suggests skilled development, possibly initially targeting Fortinet devices before adapting to Sophos. Pygmy Goat's versatile communication methods and remote shells indicate it wasn't designed for a specific device. Sophos has reported multiple attack campaigns, including a breach at its Cyberoam office in India, where attackers used overlooked display units to gain access and deploy persistent payloads. |
Risks: Malware, Patch Management, Inadequate Network Segmentation CVEs: |
|
Keywords: Sophos, Fortinet, Pygmy Goat, Firewall Breach, Linux Malware Affected: Sophos, Fortinet, Linux-based network devices, Sophos XG firewall devices, FortiGate devices, Cyberoam |
|
| Read More | |
|
2024-11-04 New Interlock Ransomware Targets FreeBSD and Windows ServersDiscover the latest ransomware threat targeting critical server infrastructure and learn how to protect your clients' environments from sophisticated double-extortion tactics. |
|
|
Interlock is a new ransomware operation that targets both FreeBSD servers and Windows systems, which is unusual as FreeBSD is less commonly attacked by ransomware. The operation involves breaching corporate networks, stealing data, and encrypting files to demand ransoms. The ransomware uses unique techniques such as appending a .interlock extension to encrypted files and creating ransom notes. Victims are coerced into paying hefty ransoms through threats of public data leaks in a double-extortion scheme, with demands scaling from hundreds of thousands to millions of dollars based on the organization's size. |
Risks: Malware, Sensitive Data, Other: Ransomware CVEs: |
|
Keywords: Interlock, Ransomware, FreeBSD, Windows, Double-Extortion, Data Leak Affected: FreeBSD, Windows |
|
| Read More | |
|
2024-11-04 Critical Vulnerability in Synology NAS Devices Allows Unauthorized AccessLearn about the critical importance of securing network-attached storage devices and ensuring timely patch management to prevent data breaches and ransomware attacks. |
|
|
A critical zero-click vulnerability in the SynologyPhotos app, pre-installed on Synology network-attached storage (NAS) devices, allows attackers to gain unauthorized access and potentially steal data, install ransomware, or plant backdoors. The flaw does not require authentication, making it exploitable directly over the internet, and grants root access for executing malicious code. This vulnerability is particularly concerning as Synology NAS systems are high-value targets due to their large data storage capabilities, often connected directly to the internet. Synology released patches to address the issue, but the lack of automatic updates means many users might remain unaware or unprotected. The vulnerability could also enable attackers to use compromised devices as part of a botnet, further amplifying security risks. |
Risks: Zero-Day, Sensitive Data, Patch Management, Web App/Website Vulnerability CVEs: |
|
Keywords: Synology, NAS Vulnerability, Zero-Click Exploit, Ransomware Risk, Network Storage Security Affected: Synology, SynologyPhotos, BeeStation, DiskStation, Synology NAS devices |
|
| Read More | |
|
2024-11-03 Exploitation of Microsoft SharePoint Vulnerability CVE-2024-38094Learn about the critical importance of patch management to prevent unauthorized access and protect your network from exploitation. |
|
|
Microsoft SharePoint has a critical remote code execution vulnerability that attackers are exploiting to gain unauthorized access to corporate networks. This flaw allows attackers to move laterally across the network, compromising entire domains by leveraging a Microsoft Exchange service account with elevated privileges. They disable security defenses and install malicious tools to maintain persistence and extract credentials while evading detection. Although Microsoft fixed the issue in July 2024, ongoing exploits highlight the urgency for administrators to apply updates promptly to protect against these attacks. |
Risks: Patch Management, Privilege Escalation, Weak or Compromised Credentials, Web App/Website Vulnerability CVEs: CVE-2024-38094 |
|
Keywords: SharePoint, CVE-2024-38094, Remote Code Execution, Microsoft Exchange, Network Exploitation Affected: Microsoft SharePoint, Microsoft Exchange, Windows Defender, Active Directory |
|
| Read More | |
|
2024-11-01 High-Severity Vulnerability Found in LiteSpeed Cache Plugin for WordPressDiscover the critical importance of securing WordPress environments and how vulnerabilities in popular plugins can be leveraged by attackers, highlighting opportunities for proactive cybersecurity solutions. |
|
|
A newly disclosed high-severity security flaw in the LiteSpeed Cache plugin for WordPress poses a significant risk, potentially allowing unauthenticated users to gain administrator access and perform malicious actions. This vulnerability is due to a weak security hash check that can be brute-forced, exploiting the plugin's role simulation feature. While a patch has been released to address the issue by enhancing hash security, the flaw adds to a series of vulnerabilities recently identified in LiteSpeed, highlighting ongoing security challenges for popular WordPress plugins. |
Risks: Privilege Escalation, Web App/Website Vulnerability, Patch Management CVEs: CVE-2024-50550; CVE-2024-28000; CVE-2024-44000; CVE-2024-47374 |
|
Keywords: WordPress, LiteSpeed Cache, CVE-2024-50550, Plugin Vulnerability, Privilege Escalation Affected: WordPress, LiteSpeed Cache |
|
| Read More | |
|
2024-11-01 Supply Chain Attack Compromises LottieFiles' npm PackageGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
LottieFiles has issued a warning about a compromised version of their "lottie-player" npm package, which was part of a supply chain attack. The attack involved unauthorized versions of the package containing malicious code aimed at draining users' cryptocurrency wallets. LottieFiles responded by releasing an updated version of the library and removing the rogue versions from the npm repository. The incident does not affect their dotlottie player or SaaS services. |
Risks: Supply Chain, Open Source, Malware, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Supply Chain Attack, LottieFiles, npm Package, Cryptocurrency Wallet, Malicious Code Affected: LottieFiles, npm |
|
| Read More | |
|
2024-10-31 Midnight Blizzard Targets Organizations with Signed RDP FilesNeed some FUD to demonstrate the vulnerabilities of remote access and spear-phishing tactics? Learn how sophisticated threat actors are exploiting signed RDP files. |
|
|
Midnight Blizzard, a Russian-linked threat group, has launched a large-scale spear-phishing campaign targeting over 100 organizations globally, including governmental, educational, and defense sectors. Since October 22, the group has been using digitally signed Remote Desktop Protocol (RDP) configuration files in their phishing emails. These files connect to attacker-controlled servers and allow the harvesting of user credentials and system information. The campaign affects countries like the UK, Europe, Australia, and Japan. The use of signed RDP files, which can bypass traditional security controls, marks a new tactic for the group, enabling them to install malware and maintain persistent access to compromised systems. |
Risks: Weak or Compromised Credentials, Malware, Supply Chain CVEs: |
|
Keywords: Midnight Blizzard, Spear Phishing, RDP Files, Cyber Attack, Remote Access, Let's Encrypt Affected: Microsoft, SolarWinds, HPE, US federal government agencies, Fortinet, Pulse Secure, Citrix, Zimbra |
|
| Read More | |
|
2024-10-31 Interbank Data Breach Exposes Sensitive Customer InformationLearn about the critical importance of data protection and the risks of non-compliance with security protocols to avoid breaches and extortion attempts. |
|
|
Interbank, a major financial institution in Peru, has experienced a data breach following a failed extortion attempt by a hacker who leaked stolen data online. The breach affected the bank's systems, leading to temporary disruptions in its mobile app and online services. Although operations are mostly restored, the bank has not specified how many customers were impacted. The hacker claims to have accessed sensitive customer information, including personal details, account information, and credit card data, which is now being sold on hacking forums. Despite negotiations, Interbank chose not to comply with the extortion demands. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: |
|
Keywords: Interbank, Data Breach, Extortion, Financial Sector, Customer Data Leak Affected: Interbank |
|
| Read More | |
|
2024-10-31 Canada Faces Major Cyber Threats from China and Emerging Concerns from IndiaDiscover opportunities in the Canadian market as cyber threats from state-sponsored actors increase—time to connect with potential clients in government and private sectors. |
|
|
Canada's Communications Security Establishment (CSE) has identified China as the most aggressive cyber threat to Canada, citing extensive state-backed cyber operations targeting government networks for espionage and intellectual property theft. Over the past five years, at least 20 Canadian government networks have been compromised, and private sector entities are also at risk. The report highlights China's focus on gathering information to support its economic and military interests, with predictions of intensified espionage amid growing tensions. Russia and Iran are also noted as significant threats. Notably, India has emerged as a new concern, with state-sponsored activities likely aimed at espionage, driven by recent diplomatic tensions between Canada and India. Hacktivism further complicates the threat landscape by potentially disrupting critical infrastructure. |
Risks: Sensitive Data, State-Sponsored Attacks CVEs: |
|
Keywords: China cyber threat, Canada espionage, Indian hacktivism, state-sponsored attacks, government network compromise Affected: Canadian government networks, Canadian government agencies, Canadian government departments, Canadian private sector, Canadian firms, Canadian institutions |
|
| Read More | |
|
2024-10-31 Hackers Steal 15,000 Cloud Credentials via Exposed Git FilesNeed some FUD? Learn how exposed Git configuration files can lead to massive credential theft and understand the critical importance of securing cloud environments. |
|
|
A cybercriminal operation named EmeraldWhale has exploited exposed Git configuration files to steal over 15,000 cloud account credentials from thousands of private repositories. Using automated tools to scan IP ranges, the attackers accessed authentication tokens to download and analyze repositories from platforms like GitHub, GitLab, and BitBucket. The stolen credentials were then used for phishing, spam campaigns, and sold to other criminals. The breach highlights the risk of storing sensitive information, such as API keys and passwords, in Git configuration files. To prevent such incidents, developers are advised to use secret management tools and environment variables instead of embedding secrets directly into configuration files. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Hardcoded Secrets, Git/Repo Breach CVEs: |
|
Keywords: Cloud Credentials, Git Configuration, EmeraldWhale, Credential Theft, GitHub Security, Secret Management Affected: GitHub, GitLab, BitBucket, AWS, Amazon S3 |
|
| Read More | |
|
2024-10-31 Critical RCE Vulnerability Found in VMware vCenter ServerLearn about the critical importance of patch management and how timely updates can prevent severe vulnerabilities in virtualization management platforms. |
|
|
Security researchers have identified a critical remote code execution vulnerability in VMware vCenter Server, affecting its DCERPC protocol implementation. This severe flaw, with a CVSS score of 9.8, allows attackers with network access to exploit the server by sending specially crafted packets, potentially leading to remote code execution. The root cause involves manipulation of memory addresses through attacker-controlled input, increasing the risk of memory corruption. VMware has released a patch to address this vulnerability, emphasizing the need for prompt patching and regular security assessments to protect against potential exploitation. |
Risks: Patch Management, Remote Code Execution CVEs: CVE-2024-38812 |
|
Keywords: VMware, vCenter Server, RCE Vulnerability, CVE-2024-38812, Remote Code Execution Affected: VMware vCenter Server, VMware Cloud Foundation |
|
| Read More | |
|
2024-10-30 PSAUX Ransomware Exploits CyberPanel VulnerabilitiesLearn about the critical importance of securing web hosting panels and the risks of not patching vulnerabilities promptly. |
|
|
Over 22,000 CyberPanel instances were hit by a PSAUX ransomware attack exploiting critical vulnerabilities in versions 2.3.6 and likely 2.3.7, leading to a significant outage. The attack leveraged issues such as defective authentication, command injection, and security filter bypass, allowing unauthenticated remote root access. The vulnerabilities, disclosed by a researcher, have been partially addressed with an authentication fix available on GitHub, though a new software version hasn't been released. With the PSAUX ransomware actively exploiting these flaws, users are urged to update their systems immediately to mitigate risks. |
Risks: Patch Management, Misconfiguration, Web App/Website Vulnerability, Privilege Escalation CVEs: |
|
Keywords: CyberPanel, PSAUX Ransomware, Remote Code Execution, Vulnerability, Patch Management Affected: CyberPanel |
|
| Read More | |
|
2024-10-30 Critical Vulnerability Discovered in Spring WebFlux FrameworkLearn about the criticality of securing open-source frameworks and the importance of proactive vulnerability management in cloud environments. |
|
|
A newly disclosed critical-severity vulnerability in the Spring development framework, specifically affecting Spring WebFlux applications, requires administrators to ensure their systems are updated. The vulnerability, with a debated CVSS score ranging from 9.1 to a lower 7.4, depends on several conditions being met, including serving static resources with non-permitAll authorization rules. While the vulnerability impacts only static resources and not dynamic data, its presence in a widely used framework like Spring necessitates prompt attention to mitigate potential risks. |
Risks: Open Source, Web App/Website Vulnerability, Patch Management CVEs: CVE-2024-38821 |
|
Keywords: Spring WebFlux, CVE-2024-38821, Java vulnerability, static resources, authorization rules Affected: Spring WebFlux, Java applications |
|
| Read More | |
|
2024-10-30 Vulnerabilities in Open-Source AI and ML Models Expose Security RisksGot you some real good FUD, learn about the dangers of supply chain attacks in open-source AI and ML models. |
|
|
Researchers have identified over thirty security vulnerabilities in various open-source AI and ML models, posing risks of remote code execution and data theft. These vulnerabilities affect tools like ChuanhuChatGPT, Lunary, and LocalAI, with issues ranging from insecure object references to path traversal flaws. Recent patches by NVIDIA and the introduction of Protect AI's Vulnhuntr, a static code analyzer, aim to address some of these vulnerabilities. Additionally, a new jailbreak technique has been discovered that could exploit models like OpenAI's ChatGPT using encoded prompts. Users are advised to update their systems to mitigate potential threats. |
Risks: Supply Chain, Open Source, Web App/Website Vulnerability, API Vulnerability CVEs: CVE-2024-7474; CVE-2024-7475; CVE-2024-7473; CVE-2024-5982; CVE-2024-6983; CVE-2024-7010; CVE-2024-8396; CVE-2024-0129 |
|
Keywords: AI vulnerabilities, machine learning security, remote code execution, open-source risks, path traversal, Protect AI, NVIDIA NeMo Affected: ChuanhuChatGPT, Lunary, LocalAI, Deep Java Library, NVIDIA NeMo, OpenAI ChatGPT |
|
| Read More | |
|
2024-10-29 Chinese Hackers Breach U.S. Telecom Giants for EspionageNew opportunity - telecom and governmental sectors are under cyberespionage threat. Time to get out your rolodex and offer CloudGuard solutions! |
|
|
Chinese hackers, linked to the People's Republic of China, breached multiple U.S. telecom providers, including Verizon, AT&T, and Lumen Technologies, in an espionage operation targeting communications interception systems. The U.S. Government, with the FBI and CISA, is investigating and providing assistance. The attacks are part of broader cyberespionage activities expected to rise with the upcoming U.S. presidential elections, also affecting Canadian entities, although Canada's incidents are limited to reconnaissance activities. |
Risks: Sensitive Data, Other: Espionage CVEs: |
|
Keywords: Telecom Breach, Chinese Hackers, Salt Typhoon, Espionage, Verizon, AT&T, Lumen Technologies, Cyberattack Affected: Verizon, AT&T, Lumen Technologies, Government of Canada departments and agencies, federal political parties, House of Commons, Senate, democratic institutions, critical infrastructure, defence sector, media organizations, think tanks, NGOs |
|
| Read More | |
|
2024-10-29 Hackers Offer Unauthorized Access to Acer China's Firewall SystemsLearn about the risks of unauthorized access and the importance of robust cybersecurity measures to protect your clients' data and maintain their trust. |
|
|
Hackers are reportedly selling unauthorized access to Acer China's firewall and shell systems, potentially exposing sensitive data and compromising the company's cybersecurity infrastructure. The breach highlights the importance of robust cybersecurity measures and vigilance to protect against cyber threats. |
Risks: Weak or Compromised Credentials, Sensitive Data CVEs: |
|
Keywords: Acer China, Firewall Breach, Unauthorized Access, DarkWeb, Cyber Threat Affected: Acer China, Firewall, Shell Systems |
|
| Read More | |
|
2024-10-29 French ISP Free Suffers Data Breach Affecting MillionsLearn about the vulnerabilities in the telecommunications sector and the importance of robust cybersecurity measures to protect against data breaches. |
|
|
Free, a leading French ISP, experienced a data breach impacting approximately 19.2 million customers, with over 5.11 million IBANs stolen. The breach, attributed to a threat actor auctioning the data online, did not compromise customer passwords or bank card details. Free reported the incident to authorities and took steps to secure its systems, advising customers to watch for phishing attempts. The breach underscores the telecommunications sector's vulnerability and the need for robust cybersecurity measures. |
Risks: Sensitive Data, Web App/Website Vulnerability CVEs: |
|
Keywords: Free ISP, Iliad Group, Data Breach, Telecommunications, Customer Data, Cyber Attack, BreachForums Affected: Free, Iliad Group |
|
| Read More | |
|
2024-10-28 Critical Vulnerability in OneDev Allows Unauthorized File AccessLearn about the critical importance of securing DevOps environments and the role of patch management in preventing data breaches. |
|
|
A critical vulnerability in the OneDev DevOps platform allows unauthorized users to read sensitive files without needing credentials, posing a major security threat to organizations using the tool for development and deployment. The flaw enables attackers to access configuration files, source code, and other crucial data, potentially leading to further attacks, privilege escalation, or operational disruptions. This situation highlights the necessity of regular software updates, effective patch management, and robust security protocols to protect DevOps environments from such threats. As development tools become increasingly vital to business operations, maintaining their security is essential to prevent breaches and safeguard organizational data. |
Risks: Sensitive Data, Patch Management, Privilege Escalation, Git/Repo Breach CVEs: CVE-2024-45309 |
|
Keywords: OneDev, DevOps security, CVE-2024-45309, unauthorized access, patch management Affected: OneDev |
|
| Read More | |
|
2024-10-28 OPA for Windows Vulnerability Exposes User CredentialsLearn about the critical need for patch management and the risks of open source vulnerabilities that can impact your clients' security. |
|
|
Organizations using Open Policy Agent (OPA) for Windows should update to version 0.68.0 or later to address a vulnerability that exposes NTLM hashes due to improper input validation. This flaw allows attackers to trick OPA into accessing a malicious server, potentially leading to unauthorized access by leaking user credentials. The issue highlights risks associated with consuming open source software, as many codebases contain vulnerabilities, with a significant portion being high-risk or unpatched for extended periods. Collaboration between security and engineering teams is crucial to mitigate such risks. |
Risks: Patch Management, Weak or Compromised Credentials, Open Source CVEs: CVE-2024-8260 |
|
Keywords: Open Policy Agent, OPA, Windows Vulnerability, NTLM Hash Leak, CVE-2024-8260, Open Source Risk Affected: Open Policy Agent, Microsoft Windows |
|
| Read More | |
|
2024-10-28 Malicious npm Packages Spread BeaverTail Malware to DevelopersGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
In September 2024, three malicious npm packages were discovered containing the BeaverTail malware, linked to a North Korean campaign called Contagious Interview. These packages, mimicking popular JavaScript libraries, aim to compromise developers by acting as downloaders and information stealers. This resurgence follows previous similar incidents in August 2024, highlighting a persistent focus on targeting the cryptocurrency sector. The incidents emphasize the increasing misuse of the open-source software supply chain by threat actors to infect downstream targets and maintain access to compromised systems. |
Risks: Malware, Supply Chain, Open Source CVEs: |
|
Keywords: BeaverTail, npm packages, North Korean campaign, software supply chain, cryptocurrency sector Affected: npm, etherscan-api, cryptocurrency sector |
|
| Read More | |
|
2024-10-28 Intel's Linear Address Masking Disabled in Linux Kernel Due to Security ConcernsLearn how unpatched security features can impact system security and why it's crucial to keep up with the latest updates and mitigations. |
|
|
Intel's Linear Address Masking (LAM), integrated into the Linux kernel to allow user-space metadata storage in pointers, is now being disabled due to security concerns. Despite being supported by Intel's new Arrow Lake and Lunar Lake CPUs, the feature is disabled in the Linux kernel until security issues are resolved. Intel's patch, initially submitted in January but overlooked, ensures LAM is disabled at compile-time unless specific mitigations are turned off. The feature's utility is limited until Linear Address Space Separation (LASS) is implemented, which also requires hardware support, making LAM currently ineffective for these processors. |
Risks: Patch Management, Open Source CVEs: |
|
Keywords: Intel, Linear Address Masking, Linux Kernel, Security Vulnerability, Arrow Lake, Lunar Lake Affected: Intel, Linux kernel, Arrow Lake CPUs, Lunar Lake CPUs |
|
| Read More | |
|
2024-10-28 Ransomware Exploits SonicWall VPN Vulnerability in Corporate AttacksLearn about the importance of patch management and multi-factor authentication to protect corporate networks from ransomware attacks. |
|
|
Fog and Akira ransomware groups are exploiting vulnerabilities in SonicWall VPNs to infiltrate corporate networks. These attacks often begin with remote access through unpatched VPN accounts lacking multi-factor authentication. Once inside, the ransomware operators move quickly, encrypting data in as little as 1.5 hours. The majority of breaches are linked to Akira, with both groups exploiting a critical SSL VPN flaw. Organizations are advised to patch their systems and enable additional security measures to mitigate these risks. |
Risks: Patch Management, Weak or Compromised Credentials, Malware CVEs: CVE-2024-40766 |
|
Keywords: SonicWall, VPN Vulnerability, Ransomware, Fog, Akira, CVE-2024-40766 Affected: SonicWall VPN, Corporate Networks |
|
| Read More | |
|
2024-10-26 TeamTNT Exploits Docker for Cryptojacking and Server RentalsNeed some FUD? Want to demonstrate and understand how exposed Docker environments can be exploited for cryptojacking? This article is for you! |
|
|
TeamTNT, a notorious cryptojacking group, is launching a new campaign targeting cloud-native environments for cryptocurrency mining and renting out compromised servers. They exploit exposed Docker daemons to deploy malware and cryptominers, leveraging Docker Hub for malware distribution. This operation involves using masscan and ZGrab to identify unauthenticated Docker API endpoints and deploying malicious containers from a compromised Docker Hub account. TeamTNT employs the open-source Sliver C2 framework for server control and diversifies monetization by selling computational power on a mining rental platform. The campaign reflects an evolution in tactics, highlighting the group's persistent threat to cloud infrastructure. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Malware CVEs: |
|
Keywords: TeamTNT, Docker, Cryptojacking, Sliver C2, Cloud Security, Mining Rig Rentals Affected: Docker, Docker Hub, Docker API, Docker Swarm |
|
| Read More | |
|
2024-10-25 Penn State Settles $1.25 Million for Cybersecurity Non-ComplianceWant some FUD to demonstrate the risks and financial consequences of non-compliance with cybersecurity standards? Discover the costly lessons from Penn State's settlement. |
|
|
Penn State University settled for $1.25 million due to non-compliance with cybersecurity requirements set by the Department of Defense and NASA. A whistleblower lawsuit under the False Claims Act highlighted Penn State's failure to meet the Defense Federal Acquisition Regulation Supplement (DFARS) standards, particularly those aligned with NIST SP 800-171, affecting 15 federal contracts. Allegations included inadequate implementation of security controls, failure to document and correct deficiencies, and misrepresentation of compliance timelines. Additionally, Penn State did not use a compliant external cloud service provider. This case follows a similar whistleblower suit against Georgia Tech for related compliance failures. |
Risks: Third-Party Vendor/SaaS, Other: Non-Compliance CVEs: |
|
Keywords: Penn State, DFARS Compliance, NIST SP 800-171, Federal Contracts, Settlement Affected: Penn State University, Department of Defense, NASA, Georgia Institute of Technology, Georgia Tech Research Corporation |
|
| Read More | |
|
2024-10-25 Critical Vulnerability in Microsoft SharePoint Allows Remote Code ExecutionLearn about the importance of patch management to protect against vulnerabilities in widely-used platforms like Microsoft SharePoint. |
|
|
The Cybersecurity and Infrastructure Security Agency (CISA) has highlighted a critical vulnerability in Microsoft SharePoint that allows unauthorized remote code execution, posing significant risks to organizations. This deserialization vulnerability, disclosed in July 2024, underscores the importance of timely remediation to protect sensitive information and maintain the security of digital assets. Organizations are urged to prioritize addressing this issue to reduce exposure to potential cyberattacks. |
Risks: Patch Management, Web App/Website Vulnerability CVEs: CVE-2024-38094 |
|
Keywords: Microsoft SharePoint, Deserialization Vulnerability, Remote Code Execution, CVE-2024-38094, CISA Alert Affected: Microsoft SharePoint |
|
| Read More | |
|
2024-10-25 Windows Remote Registry Client Vulnerability Allows Privilege EscalationLearn about the critical importance of patch management to protect Windows systems from privilege escalation vulnerabilities. |
|
|
A critical vulnerability in the Windows Remote Registry client allows attackers to relay NTLM authentication, potentially leading to unauthorized system access. This elevation of privilege flaw affects all unpatched Windows versions and exploits insecure fallback transport protocols. Despite the vulnerability being patched in October 2024, it highlights the need for robust network defenses and regular security audits to mitigate risks from legacy systems and protocols. |
Risks: Privilege Escalation, Patch Management CVEs: CVE-2024-43532 |
|
Keywords: Windows, CVE-2024-43532, NTLM Relay Attack, Privilege Escalation, Patch Tuesday Affected: Windows, Active Directory, Microsoft |
|
| Read More | |
|
2024-10-25 UnitedHealth Suffers Massive Data Breach in Change Healthcare Ransomware AttackLearn about the costly impact of insufficient security measures and the importance of robust protection to prevent breaches in healthcare and beyond. |
|
|
UnitedHealth has disclosed that a ransomware attack on its subsidiary, Change Healthcare, resulted in the theft of personal and healthcare data of over 100 million individuals, marking it as one of the largest breaches in recent years. The breach, carried out by the BlackCat ransomware group, led to significant disruptions in the U.S. healthcare system, including outages that affected claim filings and prescription pricing. Despite paying a ransom to decrypt data and allegedly secure the deletion of stolen data, further extortion attempts ensued, with the stolen data later linked to another ransomware group. The financial fallout from this attack is substantial, with losses expected to reach $2.45 billion. |
Risks: Sensitive Data, Weak or Compromised Credentials, Third-Party Vendor/SaaS CVEs: |
|
Keywords: UnitedHealth, Change Healthcare, BlackCat, Ransomware, Data Breach, Healthcare Security Affected: UnitedHealth, Change Healthcare, U.S. healthcare system, Citrix remote access service |
|
| Read More | |
|
2024-10-25 AWS CDK Vulnerability Could Lead to Full Account TakeoverNeed some ammo against AWS? Have a customer or prospect that uses AWS? This article is for you! |
|
|
A vulnerability in the AWS Cloud Development Kit (CDK) allowed attackers to potentially hijack user accounts by exploiting predictable S3 bucket naming conventions. AWS has patched this flaw with a new version of the CDK, but user action is required to upgrade if they have previously bootstrapped with an older version. The issue, related to an earlier attack method called Bucket Monopoly, involved predictable S3 bucket names that attackers could exploit through namesquatting. The fix ensures assets are only uploaded to buckets owned by the user's account, and AWS recommends using unique hashes or random identifiers for S3 bucket names to prevent such attacks. |
Risks: Patch Management, Misconfiguration, Cloud Service Provider Flaw, Open Source CVEs: |
|
Keywords: AWS, Cloud Development Kit, S3 Bucket, Account Takeover, Vulnerability Affected: AWS, AWS Cloud Development Kit, S3 |
|
| Read More | |
|
2024-10-23 Critical Vulnerabilities Found in mbNET.mini and Helmholz REX100 RoutersLearn about the critical importance of securing industrial routers and the potential risks to industrial control systems from unpatched vulnerabilities. |
|
|
Germany's CERT@VDE has identified several critical and high-severity vulnerabilities in the mbNET.mini and Helmholz REX100 industrial routers. These vulnerabilities allow unauthenticated, remote attackers to execute OS commands and take control of affected devices, potentially leading to privilege escalation and information disclosure. The vulnerabilities can be exploited remotely if certain services are exposed online, or locally if an attacker gains physical access to the device. Although patches have been released by the affected vendors, their effectiveness has not been fully verified. These vulnerabilities pose a significant risk to industrial control systems and sensitive information. |
Risks: Patch Management, Hardcoded Secrets, Weak or Compromised Credentials, Shadow IT/Exposed Assets CVEs: CVE-2024-45274; CVE-2024-45275 |
|
Keywords: mbNET.mini, Helmholz REX100, industrial routers, vulnerabilities, remote access, ICS security Affected: mbNET.mini, Helmholz REX100, industrial control systems |
|
| Read More | |
|
2024-10-23 Insurance Firm Johnson & Johnson Reports Data Breach Affecting ThousandsLearn about the potential financial impact of data breaches and the importance of proactive cybersecurity measures for insurance firms. |
|
|
Insurance firm Johnson & Johnson has reported a data breach affecting over 3,200 individuals, potentially compromising sensitive personal information. Detected in mid-August 2024, the breach has prompted the company to offer free credit monitoring and identity restoration services to those impacted. The company has not disclosed further details about the attack, and no ransomware group has claimed responsibility. |
Risks: Sensitive Data, Other CVEs: |
|
Keywords: Data Breach, Insurance, Johnson & Johnson, Personal Information, Cybersecurity Incident Affected: Johnson & Johnson |
|
| Read More | |
|
2024-10-23 UN Women Database Exposes Sensitive Information OnlineLearn about the critical importance of securing cloud databases and preventing data exposure to protect sensitive information and maintain trust. |
|
|
A database from the United Nations Trust Fund to End Violence Against Women was left openly accessible online, exposing over 115,000 sensitive files. These files contained detailed financial disclosures, staffing information, contracts, and personal testimonials from organizations partnering with or funded by UN Women. The lack of access control on the database highlights the risks posed by misconfigurations, which can potentially endanger vulnerable individuals and organizations by exposing them to scams, extortion, and targeting by authoritarian regimes. This incident underscores the need for improved data management and security practices to prevent such breaches in the future. |
Risks: Misconfiguration, Sensitive Data, Shadow IT/Exposed Assets CVEs: |
|
Keywords: UN Women, Data Exposure, Database Security, Sensitive Information, Misconfiguration Affected: United Nations, UN Women, organizations partnering with UN Women |
|
| Read More | |
|
2024-10-23 Security Flaws in Mobile Apps Expose AWS and Azure CredentialsNeed some FUD? Highlight the risks of poor cloud credential management and the importance of robust security practices in app development. |
|
|
Many popular iOS and Android apps have been found to contain hardcoded, unencrypted credentials for cloud services like AWS and Azure, posing a risk of unauthorized access to sensitive user data and source code. These security vulnerabilities are due to poor development practices, and can lead to data manipulation or theft. To mitigate such risks, developers are advised to use environment variables, secrets management tools, encrypt data, conduct regular code reviews, and integrate automated security scanning into the development process. |
Risks: Sensitive Data, Hardcoded Secrets, Cloud Service Provider Flaw CVEs: |
|
Keywords: Mobile App Security, AWS Credentials, Azure Blob Storage, Hardcoded Keys, Cloud Vulnerabilities Affected: AWS, Microsoft Azure |
|
| Read More | |
|
2024-10-22 IcePeony APT Targets Asian Institutions with Webshell AttacksWant to showcase how advanced threat actors exploit vulnerabilities in cloud environments? This article reveals the tactics and tools used by state-sponsored groups. |
|
|
The IcePeony APT group, a Chinese state-sponsored threat actor active since 2023, targets entities in India, Mauritius, and Vietnam. Their attack strategy involves SQL injection to compromise government and academic institutions, leading to webshell and backdoor installations for credential theft and data exfiltration. Utilizing custom tools like IceCache and StaX, IcePeony's multi-stage attacks employ open-source utilities and encrypted proxy communications. They gather system information with scripts and maintain persistence with backdoor shells and user accounts. Additionally, they use the Diamorphine rootkit and malware targeting IIS servers. |
Risks: Web App & API Vulnerability, Malware, Weak or Compromised Credentials CVEs: |
|
Keywords: IcePeony, APT, SQL Injection, Webshell, Data Exfiltration, China, Government Institutions, Academic Institutions Affected: Government institutions, Academic institutions, IIS servers |
|
| Read More | |
|
2024-10-22 ScienceLogic SL1 Vulnerability Exploited, Affects Rackspace SystemsLearn about the critical importance of third-party security and patch management to prevent unauthorized access and safeguard your cloud infrastructure. |
|
|
The article discusses a critical security flaw in ScienceLogic SL1, a platform used for monitoring IT resources, which has been actively exploited as a zero-day vulnerability. The flaw, which could lead to remote code execution, has been added to CISA's Known Exploited Vulnerabilities catalog. The issue has been patched, but it led to unauthorized access to Rackspace's internal systems, prompting the company to take its dashboard offline and notify affected customers. Rackspace uses ScienceLogic as a third-party tool for monitoring its services. |
Risks: Zero-Day, Patch Management, Third-Party Vendor/SaaS CVEs: CVE-2024-9537 |
|
Keywords: ScienceLogic SL1, Rackspace, Zero-Day, Remote Code Execution, Vulnerability Exploitation Affected: ScienceLogic SL1, Rackspace |
|
| Read More | |
|
2024-10-22 Atlassian Patches High-Severity Vulnerabilities in Bitbucket, Confluence, and JiraLearn about the critical importance of timely patch management to prevent high-severity vulnerabilities in popular enterprise tools like Atlassian's Bitbucket, Confluence, and Jira Service Management. |
|
|
Atlassian has issued security updates to address six high-severity vulnerabilities across its Bitbucket, Confluence, and Jira Service Management products. These updates resolve critical flaws, including unauthorized data access risks in Bitbucket, path traversal and denial of service vulnerabilities in Confluence, and a buffer overflow issue in Jira Service Management that could disrupt service availability. The patches also fix an XSS vulnerability that could allow code execution in a user's browser. Users are encouraged to apply these updates to enhance the security and stability of their systems. |
Risks: Patch Management, Web App & API Vulnerability, Third-Party Vendor/SaaS CVEs: CVE-2024-21147; CVE-2022-24785; CVE-2022-31129; CVE-2024-4367 |
|
Keywords: Atlassian, Bitbucket, Confluence, Jira, Vulnerabilities, Patch Management, High-Severity, CVE Affected: Atlassian, Bitbucket, Confluence, Jira Service Management, Oracle |
|
| Read More | |
|
2024-10-22 Roundcube XSS Vulnerability Exploited to Steal CredentialsLearn about the critical importance of timely patch management to protect against sophisticated phishing campaigns targeting government agencies. |
|
|
Security researchers have identified a phishing campaign exploiting a cross-site scripting (XSS) vulnerability in the Roundcube webmail software, which allows attackers to execute arbitrary JavaScript and steal login credentials. Despite being patched in May 2024, many organizations still run vulnerable versions, making them susceptible to attacks. Threat actors utilize this flaw by embedding malicious code in emails that, when opened, execute within the webmail context to exfiltrate user credentials. Government agencies are prime targets due to their extensive use of Roundcube. The vulnerability has been recognized by the U.S. Cybersecurity and Infrastructure Security Agency as a common attack vector. |
Risks: Patch Management, Web App & API Vulnerability, Open Source, Weak or Compromised Credentials CVEs: CVE-2024-37383 |
|
Keywords: Roundcube, XSS vulnerability, credential theft, phishing campaign, CVE-2024-37383 Affected: Roundcube, Government agencies |
|
| Read More | |
|
2024-10-22 Critical Vulnerability in VMware vCenter Server Requires Second PatchLearn about the critical importance of timely patch management in preventing remote code execution vulnerabilities. |
|
|
VMware is addressing a critical remote code execution flaw in its vCenter Server platform, initially exposed during a Chinese hacking contest. The vulnerability, found in the DCERPC protocol implementation, has a high severity score, allowing network-accessible attackers to execute code remotely. VMware released a second patch to mitigate this issue and also addressed a privilege escalation bug with moderate severity in the same update. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation CVEs: CVE-2024-38813 |
|
Keywords: VMware, vCenter Server, Remote Code Execution, DCERPC, Patch Management Affected: VMware, vCenter Server |
|
| Read More | |
|
2024-10-22 Fortinet Criticized for Handling of FortiManager Cloud Zero-Day VulnerabilityNeed some ammo against Fortinet? This article is for you! |
|
|
Fortinet is facing criticism for its handling of a zero-day vulnerability actively exploited in its FortiManager Cloud product. Despite having known about the issue for nearly two weeks, the company has yet to release a CVE, a public write-up, or mention the vulnerability in its patch notes. This situation contrasts with Fortinet's recent advocacy for transparency and responsible vulnerability disclosure in the cybersecurity industry. |
Risks: Zero-Day, Patch Management CVEs: |
|
Keywords: Fortinet, Zero-Day, FortiManager Cloud, Vulnerability Disclosure, Security Flaw Affected: Fortinet, FortiManager Cloud |
|
| Read More | |
|
2024-10-22 Transak Data Breach Exposes Sensitive User Information via Phishing AttackUnderstand the critical need for robust employee training and security measures to protect against sophisticated phishing attacks in the crypto industry. |
|
|
Transak, a crypto payment services provider, experienced a significant data breach affecting over 92,000 users due to a phishing attack on an employee's laptop. The breach exposed sensitive personal information, including KYC verification details, but did not impact user funds as Transak operates on a non-custodial model. In response, Transak has engaged cybersecurity experts, notified affected users and authorities, and implemented enhanced security measures, including collaboration with their KYC vendor. The incident underscores the ongoing security challenges in the crypto industry, particularly against phishing attacks, and follows similar breaches in the sector. |
Risks: Sensitive Data, Phishing Attack, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: |
|
Keywords: Transak, Data Breach, Phishing Attack, Cryptocurrency, User Data Exposure, KYC Affected: Transak, Fidelity Investments |
|
| Read More | |
|
2024-10-21 Omni Family Health Data Breach Exposes Sensitive Information of 470,000 IndividualsLearn about the critical importance of safeguarding sensitive healthcare data to prevent costly breaches and protect patient trust. |
|
|
Omni Family Health, a network of health centers in California, has experienced a data breach affecting approximately 470,000 individuals, including patients and employees. Discovered on August 7, the breach exposed sensitive personal information such as names, addresses, dates of birth, Social Security numbers, and health insurance details. Employee data also included financial account information and details about dependents and beneficiaries. The specific nature of the cyberattack remains undisclosed. |
Risks: Sensitive Data, Other CVEs: |
|
Keywords: Omni Family Health, Data Breach, Healthcare Security, Personal Information, Cyberattack Affected: Omni Family Health |
|
| Read More | |
|
2024-10-21 Cisco DevHub Data Leaked After API Token ExploitationNeed some ammo against Cisco? This article highlights their recent data exposure incident. |
|
|
Cisco took its DevHub portal offline after a hacker published non-public data, although the company maintains that its systems were not breached. The exposed data included source code, configuration files, technical documentation, and SQL files, but no personal or financial information is believed to have been compromised. The hacker, known as IntelBroker, accessed the data through an exposed API token in a third-party developer environment. Despite the hacker's claims of ongoing access, Cisco has blocked all access to the affected portal and continues to investigate the incident. |
Risks: Web App & API Vulnerability, Third-Party Vendor/SaaS, Shadow IT/Exposed Assets CVEs: |
|
Keywords: Cisco, Data Leak, DevHub, API Token, IntelBroker, Third-Party Access Affected: Cisco, JFrog |
|
| Read More | |
|
2024-10-21 Internet Archive Breached Through Stolen GitLab TokensLearn about the critical importance of securing API tokens and managing access controls to prevent data breaches. |
|
|
The Internet Archive experienced another data breach through their Zendesk email support platform due to stolen GitLab authentication tokens. Despite warnings, the organization failed to rotate exposed API keys, allowing the threat actor access to over 800,000 support tickets. This breach follows a prior attack where user data for 33 million users was stolen and a DDoS attack occurred, though these were carried out by different groups. The breach began with an exposed GitLab configuration file, leading to unauthorized access to source code and database credentials, ultimately resulting in the theft of 7TB of data. The motivation was not financial but rather opportunistic, highlighting the ongoing issue of data breaches within the cybersecurity community. |
Risks: Hardcoded Secrets, Web App & API Vulnerability, Weak or Compromised Credentials, Shadow IT/Exposed Assets CVEs: |
|
Keywords: Internet Archive, Zendesk breach, GitLab tokens, data exfiltration, API key security Affected: Internet Archive, Zendesk, GitLab |
|
| Read More | |
|
2024-10-21 Vulnerabilities Found in Popular Encrypted Cloud Storage ServicesLearn about the critical vulnerabilities in popular E2EE cloud storage platforms and the importance of robust encryption and authentication measures. |
|
|
Recent research has uncovered significant security vulnerabilities in end-to-end encrypted (E2EE) cloud storage platforms used by over 22 million users, including services like Sync, pCloud, Icedrive, Seafile, and Tresorit. These vulnerabilities allow attackers to manipulate data, inject files, and access user information due to weaknesses in encryption and authentication processes. The study highlights issues such as unauthenticated key material, tampering with file contents, protocol downgrades, and server-controlled certificate vulnerabilities. Some providers have acknowledged the issues and plan to address them, while others have not responded or opted not to fix the vulnerabilities. |
Risks: Web App & API Vulnerability, Cloud Service Provider Flaw, Third-Party Vendor/SaaS CVEs: |
|
Keywords: E2EE, Cloud Storage, Sync, pCloud, Icedrive, Seafile, Tresorit, Encryption Vulnerabilities Affected: Sync, pCloud, Icedrive, Seafile, Tresorit |
|
| Read More | |
|
2024-10-18 Microsoft Loses Critical Security Logs for a Month Due to BugNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Microsoft Azure? This article is for you! |
|
|
Microsoft recently disclosed that a bug led to the loss of critical security logs for nearly a month, impacting enterprise customers who depend on these logs for detecting unauthorized activity. This issue affected services such as Microsoft Entra, Microsoft Sentinel, and other security products, resulting in potentially incomplete or missing log data. The logging failure originated from a bug introduced while addressing another problem in Microsoft's log collection service. This incident raises concerns about the reliability of Microsoft's security logging, especially following previous criticism from CISA and other governmental bodies regarding log data accessibility. In response, Microsoft had previously expanded its free logging capabilities for certain customers earlier in 2024. |
Risks: Cloud Service Provider Flaw, Other CVEs: |
|
Keywords: Microsoft, Security Logs, Data Loss, Bug Impact, Microsoft Entra, Microsoft Sentinel Affected: Microsoft Entra, Microsoft Sentinel, Microsoft Purview, Microsoft Defender for Cloud, Microsoft Security products |
|
| Read More | |
|
2024-10-18 Globe Life Faces Extortion After Customer Data BreachLearn about the risks of data breaches and the potential impact of cyber extortion on insurance companies, and use this insight to highlight the importance of comprehensive security solutions. |
|
|
Globe Life, a major insurance company, is dealing with a cyberattack where hackers stole data and are attempting to extort the company by threatening to publish the stolen information. The breach, initially discovered in June during a security review, potentially affects at least 5,000 customers of its subsidiary, American Income Life Insurance Company, with the number possibly increasing as the investigation progresses. Globe Life confirmed that while the cybercriminals are demanding a ransom, this is not a ransomware attack as there is no data encryption involved. |
Risks: Sensitive Data, Web App & API Vulnerability CVEs: |
|
Keywords: Data Breach, Extortion, Globe Life, Insurance Cyberattack, Customer Data Security Affected: Globe Life, American Income Life Insurance Company |
|
| Read More | |
|
2024-10-18 BianLian Ransomware Targets Boston Children's Health PhysiciansLearn how healthcare institutions are prime targets for ransomware attacks and how Check Point CloudGuard can offer robust protection against such threats. |
|
|
The BianLian ransomware group has claimed responsibility for a cyberattack on Boston Children's Health Physicians (BCHP), a network of over 300 pediatric specialists. The attack compromised an IT vendor on September 6, leading to unauthorized access to BCHP's systems and the exfiltration of sensitive data. The stolen information includes personal, financial, and health-related data of current and former employees, patients, and guarantors. The BianLian group is threatening to leak the data unless a ransom is paid, adding BCHP to their extortion portal. This incident highlights ongoing cybersecurity threats to healthcare institutions. |
Risks: Sensitive Data, Third-Party Vendor/SaaS, Malware CVEs: |
|
Keywords: BianLian, Ransomware, Healthcare Breach, Data Exfiltration, Boston Children's Hospital Affected: Boston Children's Health Physicians, Boston Children's Hospital, healthcare industry |
|
| Read More | |
|
2024-10-17 Critical Vulnerability in Kubernetes Image Builder Allows Unauthorized SSH AccessLearn about the critical vulnerabilities in Kubernetes Image Builder and how proactive security measures can protect cloud environments. |
|
|
A critical vulnerability in Kubernetes Image Builder allows unauthorized SSH root access to virtual machines by utilizing default credentials during the image build process. This affects VM images built with various providers, most notably Proxmox, which is at the highest risk. While other providers like Nutanix, OVA, and QEMU also have vulnerabilities, they disable default credentials at the end of the build process, reducing the risk. To remediate, users should upgrade to Image Builder v0.1.38 or later, which addresses the flaw by randomizing passwords and disabling the builder account post-build. A temporary mitigation involves manually disabling the builder account before upgrading. |
Risks: Hardcoded Secrets, Weak or Compromised Credentials, Cloud Service Provider Flaw CVEs: CVE-2024-9486; CVE-2024-9594 |
|
Keywords: Kubernetes, Image Builder, SSH vulnerability, Proxmox, Cloud Security Affected: Kubernetes Image Builder, Proxmox, Nutanix, OVA, QEMU |
|
| Read More | |
|
2024-10-17 Ransomware and Tech Scams Surge, Highlighting Need for Stronger Cyber DefenseLearn about the critical importance of agile cybersecurity and collaboration in defending against the rising tide of ransomware and tech scams. |
|
|
Cyber threats are intensifying globally, with significant increases in ransomware and tech scams, highlighting the need for robust defense and international cooperation. Microsoft's latest report reveals a sharp rise in ransomware attacks, although fewer reach the encryption stage. Social engineering, identity compromise, and exploiting vulnerabilities remain the primary access methods. Tech scams have surged drastically, emphasizing the need for agile cybersecurity measures as malicious activities often disappear before detection. To counter over 600 million daily attacks, the industry must enhance defenses and collaborate with governments to deter cybercrime effectively. |
Risks: Malware, Weak or Compromised Credentials, Web App & API Vulnerability CVEs: |
|
Keywords: Ransomware, Tech Scams, Social Engineering, Microsoft Report, Cyber Defense Affected: Microsoft |
|
| Read More | |
|
2024-10-17 Rapid Decrease in Time to Exploit Vulnerabilities Highlights Security ChallengesLearn about the critical importance of rapid patch management and the growing threat of zero-day vulnerabilities to strengthen your sales pitch. |
|
|
The time to exploit vulnerabilities has dramatically decreased, with the average time dropping from 63 days in 2018-2019 to just five days in 2023. This trend is driven by improved tools, techniques, and intelligence sharing, with a significant increase in zero-day exploitation. Over half of known vulnerabilities are now exploited within a month of patch release, underscoring the need for rapid patching and vigilance. The time from vulnerability disclosure to exploitation varies, with publicly available exploits reducing this period. Two case studies highlight how exploit availability and complexity affect attack timelines, with attackers prioritizing easily weaponizable vulnerabilities. |
Risks: Zero-Day, Patch Management, Web App & API Vulnerability CVEs: CVE-2023-28121; CVE-2023-27997 |
|
Keywords: Zero-Day Exploitation, Rapid Patching, Vulnerability Management, CVE-2023-28121, CVE-2023-27997 Affected: WooCommerce Payments, FortiOS SSL VPN |
|
| Read More | |
|
2024-10-16 Five Steps to Enhance Cloud Detection and ResponseDiscover strategies to improve real-time detection and response in cloud environments, showcasing the importance of effective security measures for potential clients. |
|
|
Organizations adopting cloud environments face challenges in effective detection and response due to an over-reliance on various tools, leading to delays in incident resolution and increased costs. To enhance real-time detection and response capabilities, it is crucial to implement strategies such as adding runtime visibility and protection, employing a multi-layered detection strategy, integrating vulnerability and incident views, incorporating identities for better understanding of attacks, and ensuring a diverse range of response actions for contextual interventions. |
Risks: Misconfiguration, Other CVEs: |
|
Keywords: Cloud Security, Detection and Response, Runtime Protection, Multi-Layered Strategy, Incident Management Affected: |
|
| Read More | |
|
2024-10-16 Organizations Vulnerable to Attacks Due to Weak SSO Security PracticesNeed some FUD? Highlight the critical importance of robust identity management and MFA to protect against prevalent phishing and credential-based attacks in cloud environments! |
|
|
Organizations using single sign-on (SSO) are highly susceptible to identity-based attacks due to vulnerabilities in their authentication practices. As businesses increasingly rely on cloud services and digital technologies, identity management becomes crucial. Despite the adoption of SSO and multifactor authentication (MFA), gaps remain, with a significant portion of accounts lacking robust security measures. Research indicates that many accounts use weak or phishable MFA methods, leaving them open to phishing, credential stuffing, and brute-force attacks. Additionally, accounts with multiple login methods, including SSO and passwords, are at risk, especially if MFA is not enabled. This highlights the need for more secure authentication practices to protect identities in the digital landscape. |
Risks: Weak or Compromised Credentials, Phishing Attacks, Other CVEs: |
|
Keywords: Single Sign-On, Identity Management, Phishing Attacks, MFA Vulnerabilities, Credential Stuffing Affected: |
|
| Read More | |
|
2024-10-16 GitHub Enterprise Server Vulnerability Allows Unauthorized AccessLearn about the critical importance of securing enterprise software and how vulnerabilities can lead to unauthorized access. |
|
|
GitHub has issued security updates for its Enterprise Server to fix several vulnerabilities, including a critical flaw that allows unauthorized access to server instances by bypassing SAML SSO authentication. This critical bug stems from improper verification of cryptographic signatures and could enable unauthorized user provisioning. The update also addresses an information disclosure vulnerability and a sensitive data exposure issue in HTML forms. |
Risks: Patch Management, Web App & API Vulnerability, Sensitive Data CVEs: CVE-2024-9487; CVE-2024-4985; CVE-2024-9539; |
|
Keywords: GitHub, Enterprise Server, Vulnerability, Unauthorized Access, CVE-2024-9487, SAML Bypass Affected: GitHub Enterprise Server |
|
| Read More | |
|
2024-10-16 Critical Vulnerability in SolarWinds Web Help Desk Allows Unauthorized AccessLearn about the critical importance of securing help desk software and how vulnerabilities can lead to unauthorized access to sensitive data. |
|
|
CISA has identified a critical vulnerability in SolarWinds Web Help Desk software, which is actively being exploited. This flaw allows unauthorized access and modifications due to hard-coded credentials, enabling attackers to read and change sensitive help desk ticket information. Details were initially disclosed by SolarWinds in August 2024, with further technical insights provided by Horizon3.ai. This vulnerability follows another recent flaw in the same software, highlighting ongoing security concerns. |
Risks: Hardcoded Secrets, Sensitive Data, Patch Management, Web App & API Vulnerability CVEs: CVE-2024-28987; CVE-2024-28986 |
|
Keywords: SolarWinds, Web Help Desk, CVE-2024-28987, CISA, Vulnerability Exploitation, Unauthorized Access Affected: SolarWinds Web Help Desk |
|
| Read More | |
|
2024-10-16 Cybersecurity Burnout Crisis Threatens Organizational SecurityLearn how addressing cybersecurity burnout can enhance organizational security and resilience, and uncover opportunities to support stressed security teams with strategic solutions. |
|
|
A recent report from BlackFog highlights a significant cybersecurity burnout crisis, with nearly a quarter of CISOs and IT Security Decision Makers considering leaving their roles due to overwhelming stress. The study reveals that security leaders are working excessive hours under mounting pressure from sophisticated threats like AI-driven cyberattacks and ransomware. The burnout is exacerbated by insufficient budgets, which hinder access to necessary tools, and a reactive security environment focused on immediate threat responses rather than strategic planning. This crisis threatens organizational security by risking the loss of top talent and creating security gaps. To mitigate this, companies must invest in resources, foster supportive cultures, and address stress causes to enhance cybersecurity resilience and retain skilled professionals. |
Risks: Other CVEs: |
|
Keywords: Burnout, CISOs, AI-powered attacks, Ransomware, Cybersecurity stress Affected: |
|
| Read More | |
|
2024-10-15 Critical Vulnerability in pac4j Allows Remote Code ExecutionLearn about the critical importance of patch management to safeguard against vulnerabilities that can lead to remote code execution and potential system compromise. |
|
|
A critical vulnerability in the Java security framework pac4j, affecting versions prior to 4.0, has been discovered, allowing remote code execution (RCE). This flaw arises from an issue in the deserialization process within pac4j-core, enabling attackers to execute arbitrary code by exploiting systems that store externally controlled values in user attributes. The vulnerability was reported and fixed with the release of version 4.0, highlighting the importance of updating to secure systems against potential RCE attacks that could compromise confidentiality, integrity, and availability. |
Risks: Patch Management, Web App & API Vulnerability, Open Source CVEs: CVE-2023-25581 |
|
Keywords: pac4j, Java vulnerability, remote code execution, CVE-2023-25581, deserialization flaw Affected: pac4j-core |
|
| Read More | |
|
2024-10-15 OilRig Hackers Exploit Microsoft Exchange Servers in UAE and Gulf RegionsNew opportunity - companies in the energy and governmental sectors are under threat from sophisticated cyber espionage attacks. Time to get out your rolodex. |
|
|
The OilRig hackers, linked to Iranian interests, are targeting energy, governmental, and critical infrastructure sectors in the UAE and Gulf regions by exploiting Microsoft Exchange servers. Using sophisticated methods, they deploy a backdoor to steal credentials, beginning with uploading a web shell for remote control. They employ tools like ngrok for persistence, exploit Windows vulnerabilities for privilege escalation, and use password filter DLLs to capture and exfiltrate data. Their comprehensive attack strategy includes custom loaders, encrypted payloads, and supply chain attacks, demonstrating their evolving capabilities and persistent threat to critical systems. Their malware is crafted to blend into network traffic and avoid detection. |
Risks: Over Permissive Roles & Privilege Escalation, Malware, Supply Chain, Weak or Compromised Credentials CVEs: CVE-2024-30088 |
|
Keywords: OilRig, Microsoft Exchange, UAE, Cyber Espionage, Earth Simnavaz, Credential Theft Affected: Microsoft Exchange Server |
|
| Read More | |
|
2024-10-15 Juniper Networks Releases Security Patches for Junos OS VulnerabilitiesLearn about the critical importance of timely patch management and how vulnerabilities in network operating systems can expose enterprises to severe security risks. |
|
|
Juniper Networks has issued patches for numerous vulnerabilities in its Junos OS and Junos OS Evolved systems, including significant flaws in components like the packet forwarding engine, routing protocol daemon, and HTTP daemon. These vulnerabilities could enable unauthenticated attackers to cause denial-of-service conditions, access sensitive data, or gain control over devices. The updates also address issues in third-party components like Nginx, PHP, and OpenSSL, as well as a critical command injection flaw in Junos Space. The fixes aim to enhance security by mitigating risks associated with these vulnerabilities. |
Risks: Patch Management, Third-Party Vendor/SaaS, Web App & API Vulnerability CVEs: CVE-2016-0746; CVE-2017-20005 |
|
Keywords: Juniper Networks, Junos OS, Security Patches, Vulnerabilities, Network Security Affected: Juniper Networks, Junos OS, Junos OS Evolved, C-ares, Nginx, PHP, OpenSSL, Junos Space, OpenSSH |
|
| Read More | |
|
2024-10-15 Jetpack WordPress Plugin Patches Critical VulnerabilityLearn about the critical importance of regularly auditing and patching plugins to prevent vulnerabilities from affecting millions of users. |
|
|
The Jetpack WordPress plugin, used by 27 million sites, has patched a critical vulnerability that allowed logged-in users to access forms submitted by others. This issue, existing since 2016, was discovered during an internal security audit. Jetpack had previously addressed a similar flaw in June 2023. |
Risks: Patch Management, Sensitive Data, Web App & API Vulnerability CVEs: |
|
Keywords: Jetpack, WordPress, Vulnerability, Plugin Security, Patch Management Affected: WordPress, Jetpack |
|
| Read More | |
|
2024-10-15 Data Breaches Impact Gryphon Healthcare and Tri-City Medical CenterNeed some FUD to highlight the critical importance of data security in healthcare? Discover the severe consequences of data breaches and the vulnerabilities in third-party services. |
|
|
Gryphon Healthcare and Tri-City Medical Center have disclosed significant data breaches affecting hundreds of thousands of individuals. Gryphon's breach, discovered in August 2024, involved unauthorized access to sensitive patient information through a third-party partner. Compromised data included personal and medical details of nearly 393,358 individuals. Tri-City Medical Center reported a breach affecting 108,149 people, stemming from a November 2023 cyberattack. This breach involved exposure of personal identifiers and was later linked to the Inc Ransom ransomware group. Both incidents highlight vulnerabilities in healthcare data security and the risks associated with third-party services and cyberattacks. |
Risks: Sensitive Data, Ransomware, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Data Breach, Healthcare Security, Gryphon Healthcare, Tri-City Medical Center, Ransomware, Third-Party Risk Affected: Gryphon Healthcare, Tri-City Medical Center |
|
| Read More | |
|
2024-10-15 Splunk Enterprise Vulnerabilities Enable Remote Code ExecutionLearn about the importance of patch management to protect critical infrastructure and prevent remote code execution vulnerabilities. |
|
|
Splunk has issued patches for several high-severity vulnerabilities in its Enterprise and Cloud Platform products, which could allow attackers to execute remote code. These vulnerabilities primarily affect low-privileged users by exploiting insecure configurations, enabling file manipulation, and unauthorized data access. The issues highlight the importance of timely security updates for critical infrastructure tools like Splunk, which are often targeted due to their access to sensitive organizational data. |
Risks: Patch Management, Misconfiguration, Over Permissive Roles & Privilege Escalation, Third-Party Vendor/SaaS CVEs: CVE-2024-45733; CVE-2024-45731; CVE-2024-45732; |
|
Keywords: Splunk, Remote Code Execution, Vulnerabilities, CVE-2024-45733, Security Patches, Cloud Platform Affected: Splunk Enterprise, Splunk Cloud Platform, Splunk Add-on for Amazon Web Services, Windows |
|
| Read More | |
|
2024-10-15 Supply Chain Attack Targets Open-Source Package RepositoriesGot you some real good FUD, learn about the dangers of supply chain attacks and how they can stealthily compromise cloud environments. |
|
|
A sophisticated supply chain attack has been discovered, targeting entry points in popular open-source package repositories like PyPI, npm, Ruby Gems, and NuGet. This attack method exploits entry points, which are designed to expose functionalities as command-line interface commands, by creating malicious packages that mimic popular tools or system commands. When developers unknowingly install these packages and execute the commands, they trigger harmful code execution. The attack employs tactics such as command-jacking, system command impersonation, and command wrapping to stealthily exfiltrate sensitive information or compromise cloud infrastructures. This attack vector poses significant risks to both individual developers and enterprises by bypassing traditional security checks. |
Risks: Supply Chain, Open Source, Malware CVEs: |
|
Keywords: Supply Chain Attack, Open-Source Repositories, PyPI, npm, Command-Jacking, Cloud Security Affected: PyPI, npm, Ruby Gems, NuGet, Dart Pub, Rust Crates |
|
| Read More | |
|
2024-10-14 Microsoft Releases Security Update for Azure Linux 2.0Need some ammo against Microsoft Azure? Have a customer or prospect that uses Azure? This article is for you! |
|
|
Microsoft has released an update for Azure Linux 2.0, addressing numerous security vulnerabilities in critical components like cURL, CMake, and OpenSSL, among others. This update, which is crucial for maintaining security in production environments, also introduces new features such as an Azure Marketplace ARM64 FIPS image definition and integration of an Azure proxy agent into cloud-init. Users can access the updated version on GitHub to ensure their systems are secure and up-to-date. |
Risks: Patch Management, Open Source, Cloud Service Provider Flaw CVEs: |
|
Keywords: Azure Linux 2.0, Microsoft Update, Security Vulnerabilities, OpenSSL, Cloud Security Affected: Microsoft Azure, Azure Linux 2.0, cURL, CMake, Krb5, Moby, Ruby, Python, xorg-x11-server, Vim, OpenSSL, Linux kernel |
|
| Read More | |
|
2024-10-14 Fidelity Investments Breach Exposes Personal Data of 77,000 CustomersLearn about the critical importance of safeguarding sensitive customer data and the financial impact of data breaches on large financial institutions. |
|
|
Fidelity Investments experienced a data breach in August, affecting over 77,000 individuals, where unauthorized access led to the exposure of sensitive personal information, including names, Social Security numbers, financial account data, and driver's license details. The breach was discovered on August 19, and measures were taken to stop the unauthorized access. This incident marks the second data breach Fidelity has reported this year, following a prior breach involving a third-party provider. |
Risks: Sensitive Data, Third-Party Vendor/SaaS, Weak or Compromised Credentials CVEs: |
|
Keywords: Fidelity Investments, Data Breach, Personal Information, Unauthorized Access, Financial Services Security Affected: Fidelity Investments, Infosys McCamish System |
|
| Read More | |
|
2024-10-14 Veeam Software Vulnerability Exploited in Ransomware AttacksLearn about the critical importance of patch management and robust VPN security to protect against sophisticated ransomware attacks exploiting vulnerabilities. |
|
|
Ransomware operators are exploiting a critical vulnerability in Veeam Backup & Replication software to gain unauthorized access and deploy malware. The flaw allows remote code execution without authentication and has been used to create rogue accounts and spread ransomware, such as Fog and Akira. Despite a patch being released in September, attackers continue to exploit this vulnerability by targeting VPN gateways lacking multi-factor authentication. These incidents highlight the importance of timely patching and robust security measures to protect against such threats. |
Risks: Patch Management, Malware, Weak or Compromised Credentials, Web App & API Vulnerability CVEs: CVE-2024-40711 |
|
Keywords: Veeam, Ransomware, CVE-2024-40711, Vulnerability Exploitation, Patch Management Affected: Veeam Backup & Replication, Hyper-V, VPN gateways |
|
| Read More | |
|
2024-10-12 F5 BIG-IP LTM Vulnerable Due to Unencrypted CookiesDiscover the risks of unencrypted cookies and the importance of securing load balancing tools to protect internal networks. |
|
|
CISA has identified that cyber threat actors are exploiting unencrypted persistent cookies in the F5 BIG-IP Local Traffic Manager (LTM) module to discover non-internet facing devices on networks. These cookies, vital for maintaining session consistency and load balancing, are unencrypted by default, which can allow malicious actors to infer or identify other network resources and potentially exploit vulnerabilities in those devices. CISA advises administrators to follow F5's guidelines for encrypting these cookies to prevent such exploitation. |
Risks: Misconfiguration, Shadow IT/Exposed Assets CVEs: |
|
Keywords: F5 BIG-IP, LTM, unencrypted cookies, network vulnerability, CISA Affected: F5 BIG-IP Local Traffic Manager |
|
| Read More | |
|
2024-10-11 Critical Vulnerability Found in Nortek Linear eMerge E3 Access Control SystemLearn about the critical importance of proactive security measures and patch management in preventing unauthorized access to systems. |
|
|
A critical vulnerability in the Nortek Linear eMerge E3 access control system has been identified, allowing remote attackers to execute arbitrary commands. With a high severity score of 9.8, proof-of-concept exploits have been released, raising concerns over potential exploitation. The vendor has previously been slow to address similar vulnerabilities, suggesting that organizations using the system should act quickly to isolate or take these devices offline. Security best practices, such as network segmentation and firewall protection, are recommended to mitigate risks. |
Risks: Patch Management, Web App & API Vulnerability, Inadequate Network Segmentation CVEs: CVE-2024-9441; CVE-2019-7256 |
|
Keywords: Nortek Linear eMerge E3, CVE-2024-9441, Access Control Vulnerability, Remote Code Execution, Network Security Affected: Nortek Linear eMerge E3 |
|
| Read More | |
|
2024-10-11 Critical GitLab Vulnerability Allows Unauthorized CI/CD Pipeline ExecutionLearn about the critical importance of patch management and how vulnerabilities can impact CI/CD pipelines, highlighting opportunities for enhancing cloud security. |
|
|
GitLab has issued security updates for both its Community and Enterprise Editions to fix eight vulnerabilities, including a critical flaw that allows unauthorized execution of CI/CD pipelines on arbitrary branches. This critical vulnerability highlights the importance of updating to the latest version to mitigate potential security risks. In addition to the critical issue, four vulnerabilities were rated as high severity, two as medium, and one as low. Although no active exploitation has been reported, users are strongly encouraged to update their GitLab instances to ensure protection against these threats. |
Risks: Patch Management, Web App & API Vulnerability, Open Source CVEs: CVE-2024-9164; CVE-2024-8970; CVE-2024-8977; CVE-2024-9631 |
|
Keywords: GitLab, CI/CD vulnerability, pipeline execution, security update, CVE-2024-9164 Affected: GitLab |
|
| Read More | |
|
2024-10-10 Palo Alto Networks Firewall Vulnerabilities Allow Potential HijackingNeed some ammo against Palo Alto Networks? This article is for you! |
|
|
Palo Alto Networks has issued a warning about multiple security vulnerabilities in its Expedition solution that can be exploited to hijack PAN-OS firewalls. These vulnerabilities, which include command injection, cross-site scripting, and SQL injection, allow attackers to access sensitive data like user credentials and device configurations. Exploitation of these flaws can lead to unauthorized control of firewall admin accounts. The company advises immediate patching to mitigate the risks, as public exploit code is available. |
Risks: Sensitive Data, Patch Management, Web App & API Vulnerability, Weak or Compromised Credentials CVEs: CVE-2024-9463; CVE-2024-9464; CVE-2024-9465; CVE-2024-9466 |
|
Keywords: Palo Alto Networks, PAN-OS, Expedition tool, Firewall vulnerabilities, Command injection, SQL injection, Cross-site scripting Affected: Palo Alto Networks, PAN-OS firewalls, Expedition solution |
|
| Read More | |
|
2024-10-10 Trinity Ransomware Targets Healthcare with Double Extortion TacticsNew opportunity - healthcare organizations are under threat from sophisticated ransomware attacks. Time to get out your rolodex. |
|
|
Trinity ransomware is targeting healthcare organizations with sophisticated tactics like double extortion, posing a significant threat. Recently, a US healthcare provider, Rocky Mountain Gastroenterology, was attacked, with Trinity claiming to have stolen 330 GB of data. The group has also targeted other organizations globally, including a dental group in the Channel Islands and entities in the UK, Canada, and more. Trinity typically gains access by exploiting software vulnerabilities, phishing, or compromised RDP endpoints. |
Risks: Sensitive Data, Malware, Weak or Compromised Credentials CVEs: |
|
Keywords: Trinity Ransomware, Healthcare Cyberattack, Double Extortion, Data Breach, Phishing, RDP Vulnerability Affected: Rocky Mountain Gastroenterology, Cosmetic Dental Group, a law firm in Florida and Georgia, healthcare organizations, entities in the UK, Canada, China, the Philippines, Argentina, Brazil |
|
| Read More | |
|
2024-10-10 {title}{one_liner} |
|
|
{gist} |
Risks: {risks} CVEs: |
|
Keywords: {keywords} Affected: {affected} |
|
| Read More | |
|
2024-10-10 Libano-Suisse Insurance Exposes Client Data Due to Azure Blob MisconfigurationWant to illustrate the critical importance of cloud storage security and governance? This article highlights real-world risks and opportunities for enhancing client data protection. |
|
|
A misconfigured Azure Blob storage at Libano-Suisse Insurance Company exposed sensitive personal and financial data of clients across several Middle Eastern and North African countries. Discovered in September 2024, the breach affected approximately 22,000 files containing crucial documents like policies and passport numbers. Despite initial notification, the company delayed securing the data until intervention by the Qatar National Cyber Security Agency in October. This incident underscores the critical need for stringent cloud storage management and data governance practices, particularly given Libano-Suisse's significant role in healthcare benefits management through its stake in GlobeMed. |
Risks: Misconfiguration, Sensitive Data, Shadow IT/Exposed Assets CVEs: |
|
Keywords: Azure Blob, Data Breach, Cloud Misconfiguration, Libano-Suisse, Client Data Exposure Affected: Azure Blob storage, Libano-Suisse Insurance Company, GlobeMed |
|
| Read More | |
|
2024-10-10 Hackers Exploit DNS Tunneling to Evade Network FirewallsDiscover the stealthy tactics of DNS tunneling and how CloudGuard can safeguard critical infrastructure and targeted industries against these evolving threats. |
|
|
Hackers are increasingly using DNS tunneling to bypass network firewalls, exploiting the DNS protocol to hide data within queries and responses, enabling command and control over compromised systems. This method targets port 53, often left unmonitored, allowing the exfiltration of data encoded in DNS queries. Notable threat groups like "Evasive Serpens" and "Obscure Serpens" have used this technique, particularly against critical infrastructure. Recent investigations have identified four major DNS tunneling campaigns, each with unique characteristics and targeting different sectors. These campaigns are significant threats due to their distinct infrastructure, DNS configurations, and payload encoding methods. |
Risks: Malware, Sensitive Data, Inadequate Network Segmentation CVEs: |
|
Keywords: DNS Tunneling, Network Firewall, Data Exfiltration, Command and Control, Critical Infrastructure, Evasive Serpens Affected: Finance, Healthcare, Critical Infrastructure |
|
| Read More | |
|
2024-10-10 Critical Fortinet FortiOS Vulnerability Exploited in AttacksNeed some ammo against Fortinet? This article is for you! |
|
|
Attackers are actively exploiting a critical remote code execution vulnerability in Fortinet's FortiOS, allowing them to execute commands or arbitrary code on unpatched devices without user interaction. The flaw affects FortiGate and FortiManager devices and was disclosed and patched by the company in February. Administrators were advised to mitigate the risk by restricting access to the fgfmd daemon and implementing a local-in policy. Previous similar vulnerabilities have been exploited by state-sponsored actors, highlighting the importance of addressing these security issues promptly. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2024-23113; CVE-2022-42475 |
|
Keywords: Fortinet, FortiOS, Remote Code Execution, CVE-2024-23113, Vulnerability Exploitation, FortiGate, FortiManager Affected: Fortinet, FortiGate, FortiManager |
|
| Read More | |
|
2024-10-10 National Public Data Files for Bankruptcy After Massive Data BreachLearn about the severe financial and legal consequences of a massive data breach and the importance of robust data protection strategies. |
|
|
The Florida-based data brokerage company, National Public Data, has filed for bankruptcy following a significant data breach that affected potentially billions of individuals. Originally, the company reported that 1.3 million people were impacted, but court documents reveal the actual number is much higher. The breach, linked to a December 2023 cyberattack, involved a 277.1 GB data file released by the hacking group USDoD, containing personal information on about 2.9 billion individuals. As a result, the company is now facing multiple class-action lawsuits and potential regulatory actions from the FTC and numerous US states. |
Risks: Sensitive Data, Third-Party Vendor/SaaS, Web App & API Vulnerability CVEs: |
|
Keywords: Data Breach, National Public Data, USDoD Hack, Personal Information Leak, Bankruptcy, Regulatory Challenges Affected: National Public Data, Jerico Pictures |
|
| Read More | |
|
2024-10-09 Casio Experiences Network Breach Causing Service DisruptionsLearn about the importance of swift incident response and proactive security measures to prevent costly breaches and disruptions. |
|
|
Casio Computer Co., Ltd. experienced unauthorized network access that caused system disruptions, affecting some services. The company has reported the incident to data protection authorities and implemented measures to restrict external access. This follows a previous breach a year ago that exposed customer data from its ClassPad education platform. |
Risks: Unauthorized Access, Sensitive Data, Other CVEs: |
|
Keywords: Casio, Network Breach, Service Disruption, Unauthorized Access, Data Protection Affected: Casio |
|
| Read More | |
|
2024-10-09 Critical Zero-Day Vulnerability in Windows Management Console ExploitedLearn about the critical importance of timely patch management to prevent exploitation of zero-day vulnerabilities in widely-used Windows components. |
|
|
Microsoft has issued a Patch Tuesday update to address a critical zero-day vulnerability in the Windows Management Console, which is being actively exploited to execute remote code on targeted Windows systems. The flaw is part of a larger patch release that resolves 119 vulnerabilities across Windows. Notably, Microsoft is urging users to prioritize updates for remote code execution vulnerabilities in the Configuration Manager and Remote Desktop Protocol Server. Additionally, patches have been released for publicly-known issues, including privilege escalation in Winlogon and a security bypass in Windows Hyper-V. |
Risks: Zero-Day, Patch Management, Over Permissive Roles & Privilege Escalation CVEs: CVE-2024-43572; CVE-2024-43468; CVE-2024-43582; CVE-2024-43583 |
|
Keywords: Windows Management Console, Zero-Day, Remote Code Execution, Microsoft, Patch Tuesday, Vulnerability Affected: Windows Management Console, Microsoft Configuration Manager, Remote Desktop Protocol Server, Winlogon, Windows Hyper-V |
|
| Read More | |
|
2024-10-09 SAP Releases October 2024 Security Patches for Critical and High-Severity VulnerabilitiesLearn about the critical importance of timely patch management and the potential vulnerabilities in widely-used SAP systems, to better position CloudGuard solutions in safeguarding enterprise environments. |
|
|
In October 2024, SAP released 12 security notes, including critical and high-severity patches. A critical issue in the BusinessObjects Business Intelligence suite required urgent attention due to a missing authorization check. Additionally, SAP addressed high-severity vulnerabilities in Enterprise Project Connection related to the Spring framework and Log4j libraries, as well as an insecure file operations flaw in BusinessObjects. Updates also included a high-severity authorization check issue in Product Design Cost Estimating, with other patches targeting medium-severity issues in various SAP products. |
Risks: Patch Management, Web App & API Vulnerability, Open Source CVEs: CVE-2024-41730; CVE-2024-22259; CVE-2024-38809; CVE-2024-38808 |
|
Keywords: SAP, BusinessObjects, Patch Management, Enterprise Project Connection, CVE-2024-41730, Log4j Vulnerability, Spring Framework Vulnerability Affected: BusinessObjects Business Intelligence, Enterprise Project Connection, Product Design Cost Estimating, NetWeaver, Commerce Backoffice, HANA Client, S/4 HANA, Student Life Cycle Management |
|
| Read More | |
|
2024-10-09 Critical Vulnerabilities Discovered in Adobe Commerce and MagentoLearn about the critical importance of patch management to prevent severe vulnerabilities in enterprise software. |
|
|
Adobe has released a Patch Tuesday update addressing 25 critical vulnerabilities in Adobe Commerce and Magento Open Source, which are commonly targeted by malicious hackers. The vulnerabilities include risks of code execution, privilege escalation, and security feature bypass, with two vulnerabilities rated as highly severe. Affected versions include Magento Open Source 2.4.7-p2 and earlier, underscoring the importance of updating to maintain security. |
Risks: Patch Management, Privilege Escalation, Web App & API Vulnerability CVEs: |
|
Keywords: Adobe Commerce, Magento, Vulnerabilities, Patch Tuesday, Code Execution Affected: Adobe Commerce, Magento Open Source |
|
| Read More | |
|
2024-10-08 Critical Vulnerabilities in Ivanti CSA Actively ExploitedLearn about the critical importance of vulnerability management and proactive security measures to protect cloud services from exploitation. |
|
|
Ivanti has identified three critical vulnerabilities in its Cloud Service Appliance (CSA) that are being actively exploited. These zero-day vulnerabilities, when combined with a previously patched flaw, allow attackers with admin privileges to bypass restrictions, execute arbitrary SQL statements, or perform remote code execution. The vulnerabilities affect CSA versions 4.6 patch 518 and prior, with attackers exploiting them alongside a critical path traversal flaw. Ivanti advises users to update to version 5.0.2 and check for signs of compromise or alerts from security tools. This issue follows a recent addition to the U.S. CISA's Known Exploited Vulnerabilities catalog concerning Ivanti Endpoint Manager. |
Risks: Zero-Day, Patch Management, Web App & API Vulnerability CVEs: CVE-2024-9379; CVE-2024-9380; CVE-2024-9381; CVE-2024-8963 |
|
Keywords: Ivanti, Cloud Service Appliance, Zero-Day, Vulnerability Exploitation, Remote Code Execution, Path Traversal Affected: Ivanti Cloud Service Appliance, Ivanti Endpoint Manager |
|
| Read More | |
|
2024-10-07 Financial Losses from API Vulnerabilities and Bot AttacksDiscover the financial impact of API and bot vulnerabilities, and learn how to position CloudGuard solutions as essential for protecting large enterprises from costly threats. |
|
|
Organizations are facing significant financial losses, estimated between $94 and $186 billion annually, due to vulnerabilities in APIs and automated bot attacks, according to a report by Imperva. The reliance on APIs is growing, expanding the attack surface and resulting in a 40% increase in API-related security incidents in 2022 and a further 9% in 2023. Bot attacks alone have surged by 88% in 2022, with an additional 28% rise in 2023, accounting for up to $116 billion in losses each year. Large enterprises, particularly those with revenues exceeding $1 billion, are at a higher risk due to the complexity of their digital infrastructures. The report suggests fostering collaboration between security and development teams, comprehensive API monitoring, and deploying integrated security solutions to mitigate these risks. |
Risks: Web App & API Vulnerability, Shadow IT/Exposed Assets, Other CVEs: |
|
Keywords: API Security, Bot Attacks, Financial Loss, Digital Transformation, Enterprise Risk, Cyber Threats Affected: |
|
| Read More | |
|
2024-10-07 Chinese Hackers Breach Major U.S. Telecom NetworksLearn about the vulnerabilities in major telecom networks and the potential security gaps in their infrastructure. |
|
|
Chinese hackers, suspected to be linked to China's Ministry of State Security, have infiltrated major U.S. telecommunications providers such as Verizon, AT&T, and Lumen. The hackers have been inside these networks for months, primarily seeking information on federal wiretap requests, but potentially accessing broader internet traffic. The breach has led to a significant investigation by the FBI and other U.S. agencies. The hackers' sophisticated methods, including reconfiguring Cisco routers, highlight serious security vulnerabilities. This operation is separate from other Chinese cyber activities targeting U.S. critical infrastructure. |
Risks: Misconfiguration, Sensitive Data CVEs: |
|
Keywords: Telecommunications, Chinese Hackers, Data Breach, Cisco Routers, National Security Affected: Verizon, AT&T, Lumen, Cisco routers |
|
| Read More | |
|
2024-10-07 Critical Vulnerability in Apache Avro SDK Allows Remote Code ExecutionDiscover the critical importance of securing data serialization processes to prevent potential remote code execution vulnerabilities in widely-used open-source frameworks. |
|
|
A critical vulnerability in the Apache Avro Java SDK, affecting versions prior to 1.11.4, allows remote code execution by exploiting schema parsing. This flaw impacts applications that permit user-supplied Avro schemas, potentially enabling arbitrary code execution during data serialization. The vulnerability can be triggered through specific directives and is relevant to users of Apache Avro, a widely-used open-source data serialization framework. |
Risks: Open Source, Web App & API Vulnerability, Supply Chain CVEs: CVE-2024-47561 |
|
Keywords: Apache Avro, Remote Code Execution, CVE-2024-47561, Data Serialization, Java SDK Vulnerability Affected: Apache Avro |
|
| Read More | |
|
2024-10-05 Stored XSS Vulnerability Found in WordPress LiteSpeed Cache PluginLearn about the significant risks posed by vulnerabilities in popular WordPress plugins and the importance of securing web assets against opportunistic attacks. |
|
|
{gist} |
Risks: Web App & API Vulnerability, Open Source, Patch Management CVEs: CVE-2024-47374; CVE-2024-44000; CVE-2024-43917; CVE-2024-7772 |
|
Keywords: WordPress, LiteSpeed Cache, XSS, Vulnerability, CVE-2024-47374, Plugin Security Affected: WordPress, LiteSpeed Cache plugin, TI WooCommerce Wishlist plugin, Jupiter X Core WordPress plugin |
|
| Read More | |
|
2024-10-04 Critical Security Flaws Found in US Government IT SystemsLearn about the importance of robust access control in government IT systems to prevent unauthorized data access and manipulation. |
|
|
A range of high- and critical-severity vulnerabilities have been identified in government IT systems across the US, affecting platforms that manage sensitive information like Social Security numbers and voter registrations. These issues, uncovered by researcher Jason Parker, include access control flaws that allow unauthorized actions such as canceling voter registrations or escalating user privileges in public records systems. Notable affected platforms include Georgia's voter cancellation portal and Granicus' GovQA, both of which had vulnerabilities allowing data leakage and unauthorized account modifications. While some vulnerabilities have been patched, the widespread presence of these issues highlights the ongoing security challenges faced by government IT systems. |
Risks: Sensitive Data, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: |
|
Keywords: Access Control, Government Vulnerabilities, Public Records Security, Granicus GovQA, Voter Registration Portal Affected: Georgia voter cancellation portal, Granicus GovQA, Thomson Reuters C-Track eFiling, court record systems in Florida, court record systems in Arizona, court record systems in Georgia, court record systems in South Carolina |
|
| Read More | |
|
2024-10-04 DrayTek Routers Exposed to Hacking via 14 VulnerabilitiesLearn about the importance of securing network devices and the critical role of patch management to protect enterprise networks from vulnerabilities. |
|
|
Over 700,000 DrayTek routers are vulnerable to hacking due to 14 newly discovered security flaws, collectively known as DRAY:BREAK. These vulnerabilities can be exploited to gain unauthorized control over the devices, potentially allowing attackers to use them as entry points into enterprise networks. Among these, two flaws are rated critical, with one having the highest severity score due to a buffer overflow issue that could result in denial-of-service or remote code execution. To protect against these vulnerabilities, it is advised to patch affected devices, disable unnecessary remote access, and implement access control measures and two-factor authentication. |
Risks: Patch Management, Web App & API Vulnerability, Weak or Compromised Credentials CVEs: CVE-2024-41592; CVE-2024-41585; CVE-2024-41589; CVE-2024-41591 |
|
Keywords: DrayTek, router vulnerabilities, remote code execution, buffer overflow, network security Affected: DrayTek routers |
|
| Read More | |
|
2024-10-04 8220 Hacker Group Uses New Tools to Exploit Oracle WebLogic VulnerabilitiesLearn how vulnerabilities in cloud environments can be exploited by sophisticated attackers, highlighting the critical importance of robust cloud security solutions. |
|
|
The 8220 hacker group, known for targeting both Windows and Linux web servers with crypto-jacking malware, has enhanced its capabilities with two new tools, Hadooken and K4Spreader. These tools exploit vulnerabilities in Oracle WebLogic servers to execute remote code without authentication, deploying malware like the Tsunami backdoor and PwnRig cryptominer. The attack chain involves using scripts to disable cloud protection and propagate via SSH brute-force on Linux, while attempting to install a cryptominer on Windows through PowerShell. The attacks, impacting cloud services like Oracle Cloud, are geographically concentrated in Asia and South America, and share tactics with previous cases, strongly suggesting the involvement of the 8220 Gang. |
Risks: Web App & API Vulnerability, Malware, Weak or Compromised Credentials CVEs: CVE-2017-10271; CVE-2020-14883 |
|
Keywords: 8220 Gang, Hadooken, K4Spreader, Oracle WebLogic, Crypto-jacking, Cloud Security, Remote Code Execution Affected: Windows, Linux, Oracle WebLogic, SSH, Oracle Cloud, Drupal, Apache Struts |
|
| Read More | |
|
2024-10-04 Perfctl Malware Exploits Linux Servers for Crypto Mining and ProxyjackingLearn about the stealthy perfctl malware targeting Linux servers and how to protect cloud environments from sophisticated attacks. |
|
|
The article discusses a new malware campaign targeting Linux servers with a sophisticated malware called perfctl, designed to run cryptocurrency mining and proxyjacking software. Perfctl is stealthy, stopping its activities when a user logs in and resuming when the server is idle. It exploits a known security flaw to gain root access and deploys a cryptocurrency miner. The malware mimics legitimate system processes to avoid detection, and uses techniques like deleting its initial binary to cover its tracks. It also drops a rootkit for defense evasion and can retrieve proxyjacking software from a remote server. To mitigate risks, it's recommended to keep systems updated, restrict file execution, disable unused services, enforce network segmentation, and implement Role-Based Access Control (RBAC). Detection involves monitoring for unusual CPU usage or system slowdowns. |
Risks: Malware, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: CVE-2021-4043 |
|
Keywords: Linux servers, perfctl malware, cryptocurrency mining, proxyjacking, Polkit vulnerability, Apache RocketMQ Affected: Linux servers, Apache RocketMQ, Polkit |
|
| Read More | |
|
2024-10-04 Jenkins Releases Patches for Critical Server and Plugin VulnerabilitiesLearn about the critical role of timely patch management to prevent vulnerabilities from exposing your cloud automation tools. |
|
|
Jenkins has issued patches to address multiple vulnerabilities of varying severities in its server and plugins. These include two medium-severity flaws that could expose sensitive information and bypass creation restrictions, as well as high-severity issues in the OpenId Connect Authentication plugin that could potentially grant unauthorized administrator access. Additionally, a medium-severity flaw in the Credentials plugin could allow attackers to view encrypted credential values. The patches are designed to mitigate these risks by redacting sensitive information and ensuring proper validation and access control. |
Risks: Patch Management, Sensitive Data, Over Permissive Roles & Privilege Escalation, Open Source CVEs: CVE-2024-47803; CVE-2024-47804; CVE-2024-47806; CVE-2024-47807 |
|
Keywords: Jenkins, CI/CD, Vulnerabilities, OpenId Connect, Credentials Plugin, Patch Management Affected: Jenkins, OpenId Connect Authentication plugin, Credentials plugin |
|
| Read More | |
|
2024-10-04 Sellafield Ltd Fined for Cybersecurity FailingsLearn about the costly consequences of cybersecurity non-compliance in critical infrastructure and how to prevent it. |
|
|
Sellafield Ltd, a UK nuclear waste processing firm, was fined ÂŁ332,500 by the Office for Nuclear Regulation due to cybersecurity shortcomings over four years. While Sellafield did not face a successful cyberattack or compromise public safety, it failed to adhere to its own cybersecurity standards for safeguarding sensitive nuclear information. The company has since implemented improvements to its systems and structures. |
Risks: Inadequate Network Segmentation, Sensitive Data CVEs: |
|
Keywords: Sellafield, Nuclear Security, ONR Fine, Cyber Compliance, Critical Infrastructure Affected: Sellafield Ltd |
|
| Read More | |
|
2024-10-04 Rackspace Data Breach from Zero-Day Vulnerability in ScienceLogic PlatformLearn about the risks of third-party vulnerabilities and the importance of timely patch management to protect cloud infrastructure. |
|
|
Rackspace experienced a data breach due to a zero-day vulnerability in a third-party tool within the ScienceLogic SL1 platform, which it uses for IT infrastructure monitoring. The breach exposed limited customer monitoring data, including account details and encrypted credentials. ScienceLogic quickly patched the vulnerability and assisted affected customers. In response, Rackspace disabled certain monitoring features to mitigate risk and rotated exposed credentials to prevent further exploitation. The breach highlights potential risks of third-party vulnerabilities and the importance of timely patching and response. |
Risks: Zero-Day, Sensitive Data, Patch Management, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Rackspace, ScienceLogic, Zero-Day Vulnerability, Data Breach, Cloud Monitoring Affected: Rackspace, ScienceLogic SL1 |
|
| Read More | |
|
2024-10-02 Malicious Packages in PyPI Target Cryptocurrency WalletsGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
Malicious packages were discovered in the Python Package Index (PyPI) posing as cryptocurrency wallet recovery tools but were designed to steal sensitive data from users of popular wallets like Atomic, Trust Wallet, and Metamask. These packages deceptively attracted users by offering legitimate-sounding features and displaying fake popularity statistics. They employed sophisticated techniques, such as obfuscating malicious functionality and dynamically retrieving server information, to avoid detection and facilitate data exfiltration. This incident underscores the need for robust security practices and vigilant monitoring to protect against such complex threats. |
Risks: Malware, Supply Chain, Open Source CVEs: |
|
Keywords: PyPI, Cryptocurrency, Wallet Recovery, Data Theft, Supply Chain Attack Affected: Atomic, Trust Wallet, Metamask, Ronin, TronLink, Exodus |
|
| Read More | |
|
2024-10-02 Storm-0501 Exploits Weak Hybrid Cloud Credentials for Ransomware AttacksNeed some FUD? Discover how weak identity management in hybrid cloud environments can lead to devastating ransomware attacks and learn how to protect your customers with Check Point solutions. |
|
|
Storm-0501, a ransomware group active since 2021, has shifted its tactics from buying initial access to exploiting weak passwords and overprivileged accounts in hybrid cloud environments. By targeting Entra ID credentials, Storm-0501 breaches on-premises systems and pivots to cloud environments, enabling data tampering, backdoor access, and ransomware deployment. They exploit poor password management and lack of multifactor authentication to gain control. The incident underscores the importance of robust security measures, including strong identity and access management, least privilege principles, and advanced email security to prevent such attacks. |
Risks: Weak or Compromised Credentials, Over Permissive Roles & Privilege Escalation, Malware CVEs: |
|
Keywords: Storm-0501, Ransomware, Hybrid Cloud, Entra ID, Credential Theft, Microsoft Affected: Microsoft Entra ID, Active Directory, Hybrid Cloud Environments |
|
| Read More | |
|
2024-10-01 Cryptojacking Campaign Targets Exposed Docker API to Create BotnetNeed some FUD? Want to demonstrate how vulnerable cloud container environments can be to cryptojacking attacks? This is for you! |
|
|
Cybersecurity researchers have identified a new cryptojacking campaign that targets the Docker Engine API to form a malicious Docker Swarm botnet. This attack uses Docker's orchestration features for command-and-control purposes, deploying cryptocurrency miners on compromised containers. The campaign exploits unauthenticated, exposed Docker API endpoints to gain initial access, and uses additional scripts to move laterally to Docker, Kubernetes, and SSH endpoints within a network. The malware employs a rootkit to hide its processes and utilizes Docker Hub-hosted images to propagate itself. It also compromises SSH servers to maintain persistent access and exfiltrates sensitive credentials from cloud environments. The attack highlights the dangers of exposed Docker API endpoints and the appeal of cryptojacking for threat actors due to potential high rewards. |
Risks: Shadow IT/Exposed Assets, Malware, Misconfiguration CVEs: |
|
Keywords: Docker, Cryptojacking, Botnet, Cloud Security, Lateral Movement Affected: Docker, Docker Swarm, Kubernetes, SSH, Amazon Web Services, Google Cloud, Samba, GitHub Codespaces |
|
| Read More | |
|
2024-09-30 Critical NVIDIA Container Toolkit Vulnerability Threatens AI ApplicationsLearn about a critical vulnerability affecting AI applications using NVIDIA hardware and understand the importance of robust security measures in cloud environments. |
|
|
A critical vulnerability in the NVIDIA Container Toolkit affects AI applications using NVIDIA hardware in both cloud and on-premise environments. This flaw allows attackers to perform container escape attacks, potentially gaining full control over the host system to execute commands or steal sensitive data. Affecting over 35% of cloud environments, the vulnerability arises from inadequate isolation between containerized GPUs and the host, enabling unauthorized access to sensitive host resources. The flaw, which affects NVIDIA Container Toolkit 1.16.1 and earlier versions, has a critical severity rating. Technical details remain undisclosed to allow organizations time to address the issue. |
Risks: Patch Management, Cloud Service Provider Flaw, Other CVEs: CVE-2024-0132 |
|
Keywords: NVIDIA Container Toolkit, AI Vulnerability, Container Escape, Cloud Security, GPU Exploit Affected: NVIDIA Container Toolkit, AI applications, cloud environments |
|
| Read More | |
|
2024-09-30 Kia Web Portal Flaw Exposes Millions of Vehicles to Remote HackingWant to showcase the critical need for robust web security in the automotive industry? Discover how web-based vulnerabilities can put millions of vehicles at risk. |
|
|
Researchers discovered a vulnerability in a Kia web portal that allowed them to track, unlock, and start millions of vehicles remotely by exploiting a simple website flaw. This issue, part of a broader trend of web-based security weaknesses affecting several car manufacturers, highlights significant risks in the automotive industry's digital systems. Despite Kia addressing the flaw, the problem persists across the industry, with similar vulnerabilities found in other car brands, posing potential threats to vehicle control and data security. |
Risks: Web App & API Vulnerability, Over Permissive Roles & Privilege Escalation CVEs: |
|
Keywords: Kia, Vehicle Hacking, Web Portal Vulnerability, Automotive Cybersecurity, Connected Cars Affected: Kia, Honda, Infiniti, Nissan, Acura, Mercedes-Benz, Hyundai, Genesis, BMW, Rolls Royce, Ferrari, Toyota, Lexus |
|
| Read More | |
|
2024-09-30 Flax Typhoon Botnet Exploits 66 Vulnerabilities in Network DevicesLearn about the importance of proactive threat detection and the need for comprehensive security measures to protect against sophisticated botnet attacks. |
|
|
Flax Typhoon, a cyber threat actor, is exploiting 66 vulnerabilities in routers, IoT devices, and web-facing applications to gain unauthorized access to organizations in Taiwan and extract sensitive information. The botnet targets technologies like Apache, Cisco, and Zyxel, among others. The United States hosts nearly half of the compromised devices, with a significant portion of these vulnerabilities already known or weaponized. Recommended mitigations include disabling unused services, implementing network segmentation, monitoring network traffic, applying patches, and using strong passwords. |
Risks: Patch Management, Malware, Web App & API Vulnerability, Weak or Compromised Credentials, Inadequate Network Segmentation CVEs: |
|
Keywords: Flax Typhoon, Botnet, Vulnerabilities, Network Security, Exploits, IoT Devices, Apache, Cisco Affected: Apache, Cisco, Zyxel, QNAP, Fortinet, Draytek, WordPress, Telesquare, Ivanti, IBM, F5, Contec, Chamilo |
|
| Read More | |
|
2024-09-26 {title}{one_liner} |
|
|
{gist} |
Risks: {risks} CVEs: |
|
Keywords: {keywords} Affected: {affected} |
|
| Read More | |
|
2024-09-26 MoneyGram Takes Systems Offline Following CyberattackLearn how proactive cybersecurity measures can prevent business disruptions and protect sensitive data in the face of ransomware threats. |
|
|
MoneyGram recently experienced a cyberattack that prompted the company to take its systems offline to investigate and protect its network, impacting service availability. The company is collaborating with law enforcement and cybersecurity experts to address the issue and restore operations. There are concerns about potential data theft, as the incident may involve ransomware, a common threat that encrypts data and demands a ransom. MoneyGram is focused on resolving the situation and ensuring data security. |
Risks: Sensitive Data, Ransomware CVEs: |
|
Keywords: MoneyGram, Cyberattack, Ransomware, Data Breach, System Offline Affected: MoneyGram |
|
| Read More | |
|
2024-09-25 Critical Vulnerability in Ivanti vTM Allows Unauthorized Admin AccessLearn about the critical importance of patch management and how unpatched vulnerabilities can lead to unauthorized access in cloud environments. |
|
|
The CISA has identified a critical security flaw in Ivanti Virtual Traffic Manager (vTM) that is being actively exploited, allowing attackers to bypass authentication and create unauthorized admin accounts. This vulnerability was patched in August 2024, but some systems remain unpatched and vulnerable. Ivanti confirmed that a proof-of-concept for this exploit is available, and there have been active exploitations of other vulnerabilities in Ivanti devices recently. As of late September 2024, there are over 2,000 exposed Ivanti Cloud Service Appliance instances online, predominantly in the U.S., with an unknown number still at risk. |
Risks: Patch Management, Web App & API Vulnerability, Shadow IT/Exposed Assets CVEs: CVE-2024-7593; CVE-2024-8190; CVE-2024-8963; |
|
Keywords: Ivanti vTM, CVE-2024-7593, Authentication Bypass, Patch Management, Cloud Security Affected: Ivanti Virtual Traffic Manager, Ivanti Cloud Service Appliance |
|
| Read More | |
|
2024-09-25 Critical RCE Vulnerability Discovered in All GNU/Linux SystemsLearn about the critical importance of vulnerability management and proactive security measures in protecting Linux-based systems from severe threats. |
|
|
A critical unauthenticated Remote Code Execution (RCE) vulnerability affecting all GNU/Linux systems has been discovered, with a severity rating of 9.9 out of 10, indicating its potential for severe exploitation. The flaw, which has been present for over a decade, will be fully disclosed shortly, but no fix is currently available. Leading Linux distributors acknowledge the vulnerability's seriousness, yet developers are debating its security implications. The researcher who identified the flaw has faced challenges in the disclosure process, despite providing multiple proofs of concept to demonstrate the vulnerability's impact. |
Risks: Zero-Day, Open Source CVEs: |
|
Keywords: GNU/Linux, RCE vulnerability, Canonical, RedHat, security flaw, Linux distributions Affected: GNU/Linux, Canonical, RedHat |
|
| Read More | |
|
2024-09-25 Deloitte Server Breach Claims No Sensitive Data CompromisedLearn about the risks of unsecured cloud services and how proactive security measures can protect sensitive data. |
|
|
Deloitte has confirmed a security incident involving an internet-exposed Apache Solr server accessed with default credentials. The hacker, IntelBroker, claims to have stolen data including email addresses and internal communications. Despite these claims, Deloitte asserts that there is no threat to client or sensitive data, and the impact of the breach is limited. |
Risks: Misconfiguration, Weak or Compromised Credentials, Shadow IT/Exposed Assets CVEs: |
|
Keywords: Deloitte, Apache Solr, Data Breach, IntelBroker, Cloud Security Affected: Deloitte, Apache Solr |
|
| Read More | |
|
2024-09-25 ChatGPT Vulnerability Allows Data Exfiltration via AI Memory ManipulationNeed some FUD to highlight AI vulnerabilities? Discover how easily AI memory can be exploited, emphasizing the need for robust security solutions. |
|
|
A vulnerability in ChatGPT's long-term memory feature allowed attackers to plant false memories and exfiltrate user data indefinitely through prompt injections. Security researcher Johann Rehberger exploited this flaw to demonstrate how malicious instructions could be stored and used to manipulate future interactions with the AI. Despite OpenAI implementing a partial fix, the exploit could still be initiated via untrusted content such as links or images. The researcher showed how the vulnerability enabled all user inputs and AI outputs to be transmitted to an attacker's server, highlighting ongoing security challenges in handling AI memory. |
Risks: Web App & API Vulnerability, Other CVEs: |
|
Keywords: ChatGPT, AI Security, Data Exfiltration, Memory Manipulation, Prompt Injection Affected: ChatGPT, Google Drive, Microsoft OneDrive, Bing |
|
| Read More | |
|
2024-09-24 Microsoft Launches Secure Future Initiative to Strengthen CybersecurityNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Microsoft services? This article is for you! |
|
|
Microsoft's Secure Future Initiative (SFI) is a comprehensive effort to enhance cybersecurity following significant breaches involving state-sponsored espionage. Launched in November 2023, SFI aims to address past security failings by focusing on six key engineering pillars, including identity protection, tenant isolation, and network security. Key measures include the removal of unused applications and tenants, deployment of secure devices, and improved processes for handling critical vulnerabilities. This initiative is part of Microsoft's strategy to integrate security as a core company priority and improve transparency and accountability in its security practices. |
Risks: Inadequate Network Segmentation, Weak or Compromised Credentials, Cloud Service Provider Flaw CVEs: |
|
Keywords: Microsoft, Secure Future Initiative, cloud security, state-sponsored attacks, network isolation Affected: Microsoft-hosted email accounts, Microsoft network, Microsoft Entra ID, Microsoft Account (MSA), Microsoft cloud environment |
|
| Read More | |
|
2024-09-24 Versa Networks Vulnerability Exposes Authentication TokensLearn about the importance of securing API endpoints and how vulnerabilities can expose critical authentication tokens. |
|
|
Versa Networks has released patches for a vulnerability in their Versa Director platform that could lead to the exposure of authentication tokens. This flaw, found in the REST API used for orchestration and management, could be exploited if the Director is directly connected to the internet, allowing attackers to access other users' tokens and invoke additional APIs. However, if the Director is protected by a firewall or API gateway, the risk is mitigated. Organizations are advised to apply the updates and monitor for any malicious activity as recommended by the US cybersecurity agency CISA. |
Risks: Patch Management, Web App & API Vulnerability, Shadow IT/Exposed Assets CVEs: CVE-2024-45229 |
|
Keywords: Versa Networks, Authentication Tokens, REST API Vulnerability, CVE-2024-45229, Cybersecurity Patch Affected: Versa Networks, Versa Director |
|
| Read More | |
|
2024-09-23 New Splinter Tool Poses Threat to IT Environments and Cloud AccountsNeed some FUD? Discover how advanced post-exploitation tools like Splinter are targeting cloud service accounts and compromising IT environments, highlighting the critical need for robust cloud security solutions. |
|
|
Splinter is a new post-exploitation tool being used by attackers to infiltrate and disrupt IT environments. After initial access, it can execute Windows commands, steal files, gather cloud service account information, and download additional malware before self-deleting. Unlike the legitimate red-teaming tool Cobalt Strike, Splinter is designed for malicious use and is written in Rust, resulting in large file sizes. It uses a JSON configuration to manage communication with a command-and-control server, allowing attackers to remotely execute various tasks on compromised systems. |
Risks: Malware, Sensitive Data, Weak or Compromised Credentials CVEs: |
|
Keywords: Splinter, Post-Exploitation, Cloud Security, Rust, Command-and-Control, Data Theft Affected: |
|
| Read More | |
|
2024-09-23 Ivanti Cloud Service Appliance Vulnerability Allows Unauthorized AccessLearn about the critical importance of timely patch management to protect against severe vulnerabilities and active exploitation. |
|
|
Ivanti has disclosed a critical security flaw in its Cloud Service Appliance (CSA) that is being actively exploited, posing a significant risk with a severity score of 9.4. This vulnerability, present in CSA versions before 4.6 Patch 519, allows unauthorized remote access and can be exploited alongside another flaw to bypass admin authentication and execute commands. With evidence of limited exploitation, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) has mandated federal agencies to apply necessary fixes by October 10, 2024. Users are urged to upgrade to CSA version 5.0 as version 4.6 is no longer supported. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2024-8963; CVE-2024-8190 |
|
Keywords: Ivanti, Cloud Service Appliance, CVE-2024-8963, Path Traversal, Vulnerability Exploitation Affected: Ivanti |
|
| Read More | |
|
2024-09-23 High-Severity Vulnerability Found in FreeBSD Hypervisor bhyveLearn about the critical importance of patch management to secure virtual environments and protect against potential host system compromises. |
|
|
A high-severity vulnerability in the FreeBSD hypervisor, bhyve, could allow malicious software running in a guest virtual machine to execute code on the host system. This vulnerability stems from insufficient boundary validation in the USB code, potentially leading to remote code execution. The FreeBSD Project has issued a patch, and users are advised to update their systems to mitigate this risk. The vulnerability does not affect guests that do not use XHCI emulation, and no workaround is available. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Open Source CVEs: CVE-2024-41721 |
|
Keywords: FreeBSD, bhyve, Hypervisor Vulnerability, CVE-2024-41721, Virtual Machine Security, Remote Code Execution Affected: FreeBSD, bhyve |
|
| Read More | |
|
2024-09-22 Cybercriminals Exploit Foundation Software in Construction IndustryNew opportunity - companies in the construction industry are under threat from software vulnerabilities. Time to get out your rolodex. |
|
|
Threat actors are exploiting vulnerabilities in Foundation accounting software, commonly used by contractors in the construction industry, to gain administrative access via MSSQL. This access is facilitated through a publicly exposed TCP port 4243, used by a mobile app feature of the software. Attackers are leveraging this exposure to brute-force credentials and exploit default system admin accounts, thereby executing automated attacks through scripts. |
Risks: Misconfiguration, Weak or Compromised Credentials, Shadow IT/Exposed Assets, Over Permissive Roles & Privilege Escalation CVEs: |
|
Keywords: Foundation software, MSSQL vulnerabilities, construction industry cyberattack, mobile app security, administrative access breach Affected: Foundation accounting software, MSSQL, construction industry, plumbing sub-industry, HVAC sub-industry, concrete sub-industry |
|
| Read More | |
|
2024-09-22 Deloitte Breached Due to Exposed Apache Solr ServerLearn about the critical importance of securing misconfigured systems to protect sensitive communications and prevent costly breaches. |
|
|
A significant data breach at Deloitte was allegedly caused by IntelBroker, who exploited an Apache Solr server exposed with default login credentials, leading to unauthorized access to sensitive internal communications. This incident highlights the risks associated with misconfigured systems and underscores the necessity of securing digital infrastructures as organizations increasingly depend on them. Despite law enforcement actions against platforms like BreachForums, where such breaches are often facilitated, these threats persist, emphasizing the ongoing challenges in cybersecurity. |
Risks: Misconfiguration, Weak or Compromised Credentials, Shadow IT/Exposed Assets CVEs: |
|
Keywords: Deloitte, Data Breach, IntelBroker, Apache Solr, BreachForums, Misconfigured Systems Affected: Deloitte, Apache Solr |
|
| Read More | |
|
2024-09-20 Critical Oracle Vulnerabilities Allow Remote Code ExecutionLearn about the critical importance of securing Oracle environments and the potential risks of unpatched vulnerabilities in cloud services. |
|
|
CISA has issued a warning about two critical Oracle vulnerabilities affecting JDeveloper and WebLogic Server, which are being actively exploited. These vulnerabilities can allow unauthenticated attackers to execute remote code and take control of systems, impacting a wide range of Oracle applications and services, including cloud services. The flaws were initially identified as severe threats due to their potential for exploitation across many Oracle platforms. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2022-21445; CVE-2020-14644 |
|
Keywords: Oracle, Vulnerabilities, Remote Code Execution, JDeveloper, WebLogic Server, ADF Faces, CISA Alert Affected: JDeveloper, WebLogic Server, Oracle Business Intelligence, Enterprise Manager, Identity Management, SOA Suite, WebCenter Portal, Application Testing Suite, Transportation Management |
|
| Read More | |
|
2024-09-19 Critical SAML Authentication Flaw in GitLab Requires Immediate PatchingLearn about the critical importance of securing authentication protocols and the role of patch management in preventing unauthorized access. |
|
|
GitLab has issued critical patches for a severe vulnerability in both its Community and Enterprise Editions, related to a flaw in the ruby-saml library that allows authentication bypass. The flaw stems from improper signature verification of SAML Responses, potentially enabling attackers to log in as arbitrary users. While GitLab hasn't confirmed active exploitation, there are indications of attempted attacks. Users are advised to apply the patches promptly to secure their systems against potential unauthorized access. |
Risks: Patch Management, Open Source, Web App & API Vulnerability CVEs: CVE-2024-45409 |
|
Keywords: GitLab, ruby-saml, SAML vulnerability, authentication bypass, critical CVE Affected: GitLab, ruby-saml library |
|
| Read More | |
|
2024-09-19 TeamTNT Targets CentOS VPS with New Cryptojacking CampaignNeed some FUD? Discover how TeamTNT is exploiting cloud vulnerabilities and demonstrate the critical need for robust cloud security solutions. |
|
|
TeamTNT has launched a new cryptojacking campaign targeting CentOS-based Virtual Private Servers (VPS) by exploiting SSH vulnerabilities. After gaining initial access through brute force attacks, the attackers deploy a malicious script that disables security measures, removes logs, and hides their activities using the Diamorphine rootkit. They ensure persistence by setting up cron jobs and backdoor accounts, while also eliminating competing cryptocurrency mining processes. The attack has been linked to TeamTNT due to the familiar tactics and procedures observed. |
Risks: Weak or Compromised Credentials, Malware CVEs: |
|
Keywords: TeamTNT, Cryptojacking, CentOS, VPS Security, SSH Brute Force, Cloud Threats Affected: CentOS, VPS, SSH, Alibaba |
|
| Read More | |
|
2024-09-18 AT&T pays $13 million following customer data breachWant some FUD to demonstrate the $$$ effect of breaches (and maybe check for a possible opportunity)? Read about AT&T's costly data breach settlement and its implications. |
|
|
AT&T has agreed to pay $13 million to settle an investigation by the FCC regarding a data breach in January 2023 that affected 8.9 million wireless customers. This breach involved a cloud vendor's mishandling of data that should have been deleted years earlier. In response, AT&T will enhance its data governance and vendor data management practices to prevent future breaches. Additionally, the FCC is investigating a separate incident where a massive breach in April 2023 resulted in the illegal downloading of 109 million customer accounts, involving call and text data from 2022 stored on a cloud platform. |
Risks: Sensitive Data, Third-Party Vendor/SaaS CVEs: |
|
Keywords: AT&T, Data Breach, FCC Settlement, Cloud Vendor, Customer Data Leak Affected: AT&T, Snowflake |
|
| Read More | |
|
2024-09-18 Critical Vulnerability in AutoGPT Allows Unauthorized Command ExecutionLearn about the critical vulnerability in AutoGPT's security mechanisms and the importance of robust denylist implementations to safeguard cloud environments. |
|
|
A critical vulnerability in the AutoGPT library's shell command denylist feature allows attackers to bypass restrictions and execute unauthorized commands, including with root privileges. The flaw stems from the ineffective blocking of command execution, as attackers can use symbolic links or specify full command paths to circumvent the denylist. This vulnerability is exploited through Docker Compose, enabling unauthorized access to system resources and posing significant security risks to users of AutoGPT. |
Risks: Web App & API Vulnerability, Open Source, Over Permissive Roles & Privilege Escalation CVEs: |
|
Keywords: AutoGPT, vulnerability, command execution, security flaw, Docker Compose Affected: AutoGPT |
|
| Read More | |
|
2024-09-18 NHS Hospitals in London Hit by Ransomware, Leaking Patient DataLearn about the growing threat of ransomware in healthcare and how to position CloudGuard as a solution to safeguard sensitive patient data. |
|
|
In a significant ransomware attack on NHS hospitals in London, nearly one million patients had their personal and sensitive medical information leaked online. The attack, carried out by the Qilin ransomware gang, exposed details such as requests for medical appointments and tests, impacting individuals with conditions like cancer and STIs. Despite Synnovis and NHS England being responsible for data protection, they have not provided an official count of those affected. Although Synnovis has restored its IT systems, many patients remain unaware of the data breach. This incident highlights the increasing trend of ransomware attacks in the healthcare sector, which now represents over 12% of reported cyber extortion breaches in the first half of 2024. |
Risks: Sensitive Data, Malware, Third-Party Vendor/SaaS CVEs: |
|
Keywords: NHS, ransomware, data breach, Qilin gang, healthcare cybersecurity Affected: NHS, Synnovis, Qilin ransomware gang |
|
| Read More | |
|
2024-09-18 Critical Vulnerability Found in VMware vCenter ServerLearn about the critical importance of timely patch management to protect cloud infrastructures from severe vulnerabilities. |
|
|
VMware has released a patch for a critical vulnerability in vCenter Server that allows remote code execution due to a heap-overflow issue in the DCE/RPC protocol. This flaw, with a high severity score, could be exploited by attackers with network access through specially crafted network packets. In addition to this, VMware addressed another privilege escalation vulnerability in vCenter Server, which could enable attackers to gain root access. These issues are related to memory management and corruption, affecting VMware vCenter services. The update coincides with a joint advisory from CISA and the FBI, urging organizations to address cross-site scripting vulnerabilities to prevent system breaches. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: CVE-2024-38812; CVE-2024-37079; CVE-2024-37080; CVE-2024-38813 |
|
Keywords: VMware, vCenter Server, Remote Code Execution, CVE-2024-38812, Patch Management Affected: VMware, vCenter Server |
|
| Read More | |
|
2024-09-17 Kawasaki Motors Europe Data Leaked After Ransomware AttackLearn about the financial and reputational risks of ransomware attacks and how isolation and recovery strategies can mitigate damage. |
|
|
The RansomHub ransomware group has leaked 487 gigabytes of data allegedly stolen from Kawasaki Motors Europe after a failed extortion attempt. Kawasaki had disclosed the incident, stating they were recovering from a cyberattack and had isolated servers as a precaution. They reported restoring over 90% of server functionality. Despite not specifying the attack type, the RansomHub group had already added Kawasaki to its leak site before the official disclosure, ultimately releasing the data when their ransom demand was not met. |
Risks: Malware, Sensitive Data CVEs: |
|
Keywords: Kawasaki, Ransomware, Data Leak, RansomHub, Cyberattack Affected: Kawasaki Motors Europe |
|
| Read More | |
|
2024-09-17 SolarWinds Patches Critical RCE Vulnerability in Access Rights ManagerLearn about the importance of patch management and how addressing vulnerabilities proactively can protect critical systems from potential remote code execution threats. |
|
|
SolarWinds has released patches for its Access Rights Manager (ARM) software to fix two security vulnerabilities, including a critical flaw that could lead to remote code execution due to improper validation of user-supplied data. The critical vulnerability has a high severity rating and involves deserialization of untrusted data. Additionally, a medium-severity flaw involving hard-coded credentials was also addressed. There is no indication that these vulnerabilities have been actively exploited. |
Risks: Patch Management, Hardcoded Secrets, Web App & API Vulnerability CVEs: CVE-2024-28991; CVE-2024-28990 |
|
Keywords: SolarWinds, Access Rights Manager, RCE Vulnerability, CVE-2024-28991, Security Patch Affected: SolarWinds, Access Rights Manager |
|
| Read More | |
|
2024-09-17 Remote Access Software Vulnerabilities Targeted in 2024 CyberattacksWant to showcase the critical need for advanced security solutions in the face of escalating remote access vulnerabilities and sophisticated malware attacks? This article is for you! |
|
|
In the first half of 2024, cybercriminals and state-sponsored actors increasingly targeted remote access software vulnerabilities, such as those found in Ivanti Secure Connect, PAN-OS, and Microsoft SmartScreen, despite the availability of patches. This trend highlights the growing sophistication of cyber threats and the significant risk they pose to organizations. Infostealers, particularly LummaC2, dominated the malware landscape by harvesting sensitive information for financial gain, while complex attack chains involving malware loaders like GuLoader and Remcos became more prevalent. Additionally, Magecart attacks surged by 103%, exploiting vulnerabilities in popular e-commerce platforms like Adobe Commerce. |
Risks: Patch Management, Malware, Web App & API Vulnerability, Supply Chain CVEs: |
|
Keywords: Remote Access Vulnerability, Ivanti Secure Connect, PAN-OS, Microsoft SmartScreen, Infostealers, Magecart, Adobe Commerce Affected: Ivanti Secure Connect, PAN-OS, Microsoft SmartScreen, Adobe Commerce |
|
| Read More | |
|
2024-09-16 Medusa Ransomware Exploits Fortinet FortiClient EMS VulnerabilityNeed some ammo against Fortinet? Learn how their vulnerability led to sophisticated ransomware attacks. |
|
|
The Medusa ransomware group is exploiting a critical vulnerability in Fortinet's FortiClient EMS software to carry out sophisticated ransomware attacks. This SQL injection flaw allows attackers to execute malicious code, manipulate request headers, and deploy ransomware on affected systems. Once they gain initial access, Medusa uses PowerShell scripts to exfiltrate data and deliver payloads, while evading detection with compromised remote monitoring tools. Effective defense strategies include prompt patch management, network segmentation, regular backups, and employee security awareness training. |
Risks: Patch Management, Web App & API Vulnerability, Malware CVEs: CVE-2023-48788 |
|
Keywords: Medusa Ransomware, Fortinet Vulnerability, SQL Injection, FortiClient EMS, Remote Monitoring Tools Affected: Fortinet FortiClient EMS |
|
| Read More | |
|
2024-09-16 Critical Privilege Escalation Vulnerability in Azure API ManagementNeed some ammo against Microsoft Azure? Have a customer or prospect that uses Azure? This article is for you! |
|
|
Recently, a critical security vulnerability was identified in Azure API Management (APIM) that allowed users with Reader-level access to escalate their privileges to Contributor-level access. This flaw enabled unauthorized users to modify and delete configurations by exploiting a flaw in the Azure Resource Manager API, bypassing existing security restrictions. Attackers could gain full management access, compromising the security of APIM resources and potentially accessing sensitive information across integrated systems. To mitigate this risk, experts advise restricting access to critical resources by making them private and limiting access to their own virtual network (VNET). |
Risks: Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability, Cloud Service Provider Flaw CVEs: |
|
Keywords: Azure API Management, Privilege Escalation, Microsoft Azure, Cloud Security, ARM API Vulnerability Affected: Microsoft Azure, Azure API Management, Azure Resource Manager, Entra ID |
|
| Read More | |
|
2024-09-16 Google Cloud Composer Vulnerability Fixed to Prevent Dependency ConfusionNeed some ammo against Google Cloud? Have a customer or prospect that uses Google Cloud? This article is for you! |
|
|
Google has addressed a vulnerability in Google Cloud Composer, named CloudImposer, which could have allowed remote code execution by exploiting dependency confusion. This flaw involved the potential for attackers to upload a malicious package to the Python Package Index, which could then be preinstalled on all Composer instances with elevated permissions. The issue stemmed from the use of the --extra-index-url argument during package installations, prioritizing public registries and increasing the risk of dependency confusion. Google has fixed the vulnerability and recommends using the --index-url argument to mitigate such risks, ensuring packages are only fetched from specified registries. Additionally, they advise GCP customers to use an Artifact Registry virtual repository when multiple repositories are needed. |
Risks: Supply Chain, Cloud Service Provider Flaw, Open Source CVEs: |
|
Keywords: Google Cloud, Cloud Composer, Dependency Confusion, Remote Code Execution, Supply Chain Attack Affected: Google Cloud Composer, Python Package Index |
|
| Read More | |
|
2024-09-14 Ivanti Cloud Appliance Vulnerability Enables Remote Code ExecutionLearn about the critical importance of keeping your cloud services updated to prevent potential security breaches. |
|
|
Ivanti has issued a warning about the active exploitation of a high-severity vulnerability in its Cloud Services Appliance, which allows remote code execution if an attacker has admin privileges. This vulnerability affects versions up to 4.6 Patch 518, while the latest version, CSA 5.0, is not impacted. Although the exploitation has been confirmed in the wild, it targets a limited number of customers. Ivanti has not disclosed specifics about the attacks or the threat actors involved. This comes alongside a separate analysis by Horizon3.ai of a critical vulnerability in Ivanti's Endpoint Manager, also allowing remote code execution. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: CVE-2024-8190; CVE-2024-29847 |
|
Keywords: Ivanti, Cloud Services Appliance, Remote Code Execution, Vulnerability, CVE-2024-8190, Endpoint Manager, Cybersecurity Threat Affected: Ivanti Cloud Services Appliance, Ivanti Endpoint Manager |
|
| Read More | |
|
2024-09-14 23andMe pays $30 million settlement after data breachWant some FUD to demonstrate the $$$ effect of breaches (and maybe check for a possible opportunity)? Read about 23andMe's disastrous breach outcomes. |
|
|
23andMe has settled a lawsuit for $30 million following a data breach that exposed 6.4 million customers' personal information due to credential-stuffing attacks. The company has agreed to enhance its security measures, including implementing mandatory two-factor authentication, conducting annual cybersecurity audits, and establishing a data breach response plan. The breach, which occurred over five months in 2023, involved stolen health reports and genotype data. In response, 23andMe has also committed to revising its data retention policies and providing updated security training for employees. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: |
|
Keywords: 23andMe, data breach, credential stuffing, settlement, personal data Affected: 23andMe |
|
| Read More | |
|
2024-09-13 Hadooken Malware Exploits Weak Passwords on Oracle WebLogic ServersLearn about the risks of weak password management and how they can lead to severe malware infections in critical business systems. |
|
|
An unknown attacker is exploiting weak passwords to compromise Oracle WebLogic servers and deploy a new Linux malware named Hadooken. This malware includes a cryptominer and the Tsunami malware, which acts as a DDoS botnet and backdoor, providing attackers with full remote control over infected machines. The initial attack involves executing malicious scripts to download the malware, create persistent cronjobs, and steal user credentials, allowing lateral movement to other servers. WebLogic, often used in critical business systems, is a frequent target due to its vulnerabilities. |
Risks: Malware, Weak or Compromised Credentials CVEs: |
|
Keywords: Oracle WebLogic, Hadooken, Weak Passwords, Cryptominer, Tsunami Malware Affected: Oracle WebLogic, financial services providers, e-commerce operations, business-critical systems |
|
| Read More | |
|
2024-09-13 Transport for London Confirms Data Breach Affecting Customers and EmployeesLearn about the real-world impacts of a cyber incident on public infrastructure and the importance of robust security measures. |
|
|
Transport for London (TfL) has confirmed a cyber incident where the bank data of 5,000 customers and some employee details have potentially been accessed. As a result, 30,000 employees must reset their passwords in person. While TfL initially claimed no customer data had been compromised, they have since retracted this. The incident has led to significant disruptions, including the unavailability of live tube arrival information and suspension of certain services like new Oyster photocard applications. The breach has impacted both customer and employee data, although currently, only email addresses, job titles, and employee numbers are believed to be accessed. The situation is ongoing, prompting an emergency management meeting and increased security measures. This event follows a previous 2023 identity theft incident involving a London Underground worker using a keylogger. |
Risks: Sensitive Data, Weak or Compromised Credentials CVEs: |
|
Keywords: Transport for London, Data Breach, Customer Data, Employee Data, Cyber Incident Affected: Transport for London |
|
| Read More | |
|
2024-09-13 Challenges and Improvements for Microsoft's Privileged Identity ManagementWant to highlight the risks of overprivileged access in cloud environments? Learn how inadequate PIM practices can expose organizations to sophisticated threats. |
|
|
Privileged Identity Management (PIM) within Microsoft Entra ID is designed to manage and monitor access to critical resources, enhancing security through principles like least privilege and just-in-time access. However, practical challenges often lead to overprivileged users, as organizations tend to assign excessive roles, such as Global Administrator, undermining security. Attackers can exploit these weaknesses, turning temporary access into continuous privilege. To bolster PIM's effectiveness, it's recommended to enforce strict role activation justifications, implement additional MFA, establish approval processes, and use anomaly detection to ensure genuine protection against evolving cyber threats. |
Risks: Over Permissive Roles & Privilege Escalation, Insider Threats CVEs: |
|
Keywords: Privileged Identity Management, Microsoft Entra ID, Cloud Security, Access Control, Overprivileged Access Affected: Microsoft Entra ID, Microsoft Azure, Microsoft 365, Microsoft Intune |
|
| Read More | |
|
2024-09-13 Critical Vulnerability in GitLab Allows Arbitrary Pipeline ExecutionLearn about the critical importance of securing DevOps pipelines and the risks of unpatched vulnerabilities in software development environments. |
|
|
GitLab has released critical updates to address multiple vulnerabilities, with the most severe flaw allowing attackers to execute pipelines as arbitrary users, posing a significant security risk due to its potential for remote exploitation and low privilege requirements. This vulnerability can enable attackers to perform unauthorized actions like stopping jobs in the pipeline. GitLab has previously addressed similar issues, highlighting a pattern of critical vulnerabilities in their pipeline execution process. Additionally, several high-severity vulnerabilities could allow attackers to disrupt services, execute unauthorized commands, or compromise sensitive resources. |
Risks: Patch Management, Web App & API Vulnerability, Open Source CVEs: CVE-2024-6678CVE-2024-6385; CVE-2024-5655 |
|
Keywords: GitLab, Vulnerability, Pipeline Execution, CVE-2024-6678, DevOps Security Affected: GitLab |
|
| Read More | |
|
2024-09-13 Selenium Grid Servers Exploited for Crypto Mining and ProxyjackingNeed to highlight the risks of misconfiguration in cloud environments? This article is your go-to for showcasing the importance of securing test automation tools. |
|
|
Internet-exposed Selenium Grid servers are being exploited by threat actors for unauthorized cryptocurrency mining and proxyjacking activities due to a lack of default authentication. Attackers use vulnerabilities to inject malicious scripts, which deploy tools for selling internet bandwidth and mining cryptocurrency. These campaigns highlight the risks of misconfigured Selenium Grid instances and underscore the importance of enabling authentication to protect against such threats. |
Risks: Misconfiguration, Shadow IT/Exposed Assets, Malware, Over Permissive Roles & Privilege Escalation CVEs: CVE-2021-4043 |
|
Keywords: Selenium Grid, Crypto Mining, Proxyjacking, Misconfiguration, Cloud Security Affected: Selenium Grid |
|
| Read More | |
|
2024-09-13 Cisco Patches Critical Vulnerabilities in IOS XR SoftwareNeed some ammo against Cisco? Learn about the vulnerabilities in their network operating system and how Check Point can offer better protection. |
|
|
Cisco has released security updates for its IOS XR software, addressing eight vulnerabilities, including six high-severity ones. The most critical flaw could allow attackers to gain root privileges through crafted commands, while another bug enables remote denial-of-service attacks. Additional vulnerabilities involve command injection and unauthorized command execution on certain routers, with resolutions planned in future updates. The fixes also cover issues related to Ethernet frame handling, segment routing, and medium-severity bugs that could lead to unauthorized file access or denial-of-service conditions. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: CVE-2024-20398; CVE-2024-20304; CVE-2024-20483; CVE-2024-20489 |
|
Keywords: Cisco, IOS XR, Vulnerabilities, Network Security, PON Controller, Denial of Service, Command Injection Affected: Cisco, IOS XR, NCS 540, NCS 5500, NCS 5700, Routed Passive Optical Network (PON) controller software |
|
| Read More | |
|
2024-09-13 Fortinet Confirms Data Breach Involving 440GB of Stolen FilesNeed some ammo against Fortinet? This article is for you! |
|
|
Fortinet, a cybersecurity company, confirmed a data breach in which a hacker claimed to have stolen 440GB of files from its Microsoft Sharepoint server. The hacker, who attempted to extort Fortinet for a ransom, shared the stolen data on a hacking forum. Fortinet stated that the breach affected less than 0.3% of its customer base and did not lead to any malicious activity targeting its customers. |
Risks: Weak or Compromised Credentials, Sensitive Data CVEs: |
|
Keywords: Fortinet, Data Breach, Sharepoint, Azure, Cyber Extortion Affected: Microsoft Sharepoint, Fortinet |
|
| Read More | |
|
2024-09-13 Windows Installer Vulnerability Allows SYSTEM Privilege EscalationLearn about the critical importance of privilege escalation vulnerabilities and how they can impact security, underscoring the need for robust defenses and timely patch management. |
|
|
A vulnerability in Windows Installer allows malware or rogue users to gain SYSTEM-level privileges on a PC by exploiting a flaw during the repair process of an Installer package. The attack involves manipulating a brief window of opportunity during the repair process to gain elevated privileges, providing significant control over the system. This flaw is complex to fix, and Microsoft has requested more time to develop a patch. The vulnerability is already being exploited in the wild, highlighting the urgency for a resolution. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation CVEs: CVE-2024-38014 |
|
Keywords: Windows Installer, Privilege Escalation, CVE-2024-38014, SYSTEM Access, Vulnerability Exploit Affected: Windows Installer |
|
| Read More | |
|
2024-09-13 Lehigh Valley Health Network Pays $65M Settlement After Ransomware Data BreachWant some FUD to demonstrate the $$$ effect of breaches (and maybe check for a possible opportunity)? Read about Lehigh Valley Health Network's disastrous breach outcomes. |
|
|
Lehigh Valley Health Network (LVHN), a Pennsylvania healthcare provider, has agreed to a $65 million settlement following a class-action lawsuit over a ransomware attack that occurred in early 2023. The breach, which began in January and was disclosed in February, resulted in unauthorized access to sensitive personal and medical data, including names, addresses, treatment details, and financial information. A limited number of clinical images, including nude photos, were also stolen and later leaked by the BlackCat ransomware group. The lawsuit claimed that LVHN failed to adequately protect patient data. |
Risks: Sensitive Data, Malware CVEs: |
|
Keywords: Ransomware, Lehigh Valley Health Network, Data Breach, BlackCat, Healthcare Cybersecurity Affected: Lehigh Valley Health Network, Lehigh Valley Physician Group – Delta Medix, Healthcare Industry |
|
| Read More | |
|
2024-09-13 Capgemini Data Breach Exposes 20GB of Sensitive InformationNeed some FUD to highlight the risks of data breaches and the importance of securing cloud environments? This article is for you! |
|
|
A cybercriminal has leaked 20GB of sensitive data allegedly stolen from Capgemini, a French IT and consulting firm. The leaked data reportedly includes databases, source code, private keys, employee information, and client-related files such as cloud infrastructure configurations. The attacker claims to have exfiltrated large files containing confidential company data, including Terraform configurations, and is offering the stolen information on a forum. Capgemini has not yet confirmed or denied the breach. |
Risks: Sensitive Data, Weak or Compromised Credentials, Third-Party Vendor/SaaS CVEs: |
|
Keywords: Capgemini, Data Breach, Information Leak, Cloud Security, Terraform Affected: Capgemini, T-Mobile, Terraform |
|
| Read More | |
|
2024-09-13 Palo Alto Networks Patches Critical Vulnerabilities in PAN-OS and Other ProductsNeed some ammo against Palo Alto Networks? Discover how vulnerabilities in their products could highlight opportunities for Check Point's superior security solutions. |
|
|
Palo Alto Networks has released patches for numerous medium- and high-severity vulnerabilities affecting PAN-OS, Cortex XDR, ActiveMQ Content Pack, and Prisma Access Browser. The most critical of these is a command injection vulnerability in PAN-OS that allows authenticated administrators to execute arbitrary commands on the firewall. The updates also include fixes for multiple high-severity vulnerabilities in the Chromium-based Prisma Access Browser, some of which have been exploited in the wild. Other notable issues addressed include exposure of GlobalProtect portal passwords, file reading vulnerabilities, user impersonation flaws in PAN-OS, a Cortex XDR Agent vulnerability on Windows, and cleartext credential exposure in ActiveMQ Content Pack. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Sensitive Data, Weak or Compromised Credentials CVEs: CVE-2024-8686 |
|
Keywords: Palo Alto Networks, PAN-OS, Prisma Access, Cortex XDR, Vulnerability Patching, GlobalProtect Affected: Palo Alto Networks, PAN-OS, Cortex XDR, ActiveMQ Content Pack, Prisma Access Browser, GlobalProtect |
|
| Read More | |
|
2024-09-12 Ivanti Releases Updates for Critical Vulnerabilities in Endpoint ManagerLearn about the critical importance of timely patch management and how vulnerabilities can impact key enterprise systems. |
|
|
Ivanti has issued updates to fix several security vulnerabilities in its Endpoint Manager, including ten critical issues that could allow remote code execution. These updates also address high-severity vulnerabilities in Ivanti Workspace Control and Cloud Service Appliance. The company has enhanced its security measures to detect and resolve issues more efficiently. Meanwhile, Zyxel has released patches for a critical command injection flaw in its NAS devices. |
Risks: Patch Management, Web App & API Vulnerability, Third-Party Vendor/SaaS CVEs: CVE-2024-29847; CVE-2024-6342 |
|
Keywords: Ivanti, Endpoint Manager, Vulnerabilities, Remote Code Execution, Patch Management, Zyxel, CVE-2024-29847, CVE-2024-6342 Affected: Ivanti Endpoint Manager, Ivanti Workspace Control, Ivanti Cloud Service Appliance, Zyxel NAS devices |
|
| Read More | |
|
2024-09-11 Tewkesbury Borough Council Faces Cyber Attack, Systems Shut DownWant to highlight the critical need for robust incident response and risk management in local government cybersecurity? This article is for you! |
|
|
Tewkesbury Borough Council experienced a cyber attack on September 6, 2024, leading to a shutdown of its systems as a precautionary measure. While the incident is believed to be contained with no evidence of a data breach, the council is in the process of rebuilding its services and conducting forensic investigations. Due to the attack, job interviews and processing of formal complaints are suspended, and community support hubs have been established for residents. The council is focusing on a risk-based approach to restore services, underscoring the challenges local governments face in cybersecurity and the need for effective incident response protocols. |
Risks: Other CVEs: |
|
Keywords: Tewkesbury, Cyber Attack, Local Government, Incident Response, Data Protection Affected: Tewkesbury Borough Council |
|
| Read More | |
|
2024-09-11 Cybersecurity Staffing Shortage Challenges Threat MitigationWant to highlight the critical need for comprehensive cybersecurity solutions? Learn how staffing shortages and costly tools are impacting threat mitigation, presenting opportunities for Check Point's efficient solutions. |
|
|
The ongoing shortage of qualified cybersecurity professionals is a major challenge for CISOs, leading to overstretched teams, burnout, and decreased effectiveness in threat mitigation. Cyber roles require a diverse skill set across IT disciplines, making them difficult to fill. This staffing gap causes operational concerns as threats increase. While EDR/XDR tools are critical for investigations, their high costs and limitations in cloud environments hinder full utilization. Additionally, the integration of SIEM and SOAR systems is hampered by a lack of skilled resources, leading many to rely on third-party services, further complicating the staffing and cost issues in cybersecurity operations. |
Risks: Other CVEs: |
|
Keywords: staffing shortage, EDR/XDR limitations, SIEM challenges, threat mitigation, cybersecurity skills gap Affected: |
|
| Read More | |
|
2024-09-11 Vulnerabilities in Microsoft AD CS Allow Persistent Network AccessLearn how misconfigurations in widely used services like Active Directory can lead to persistent threats, highlighting the importance of secure infrastructure management. |
|
|
Security researchers have identified critical vulnerabilities in Microsoft’s Active Directory Certificate Services (AD CS) that can be exploited by attackers to gain and maintain persistent access in compromised networks. These vulnerabilities stem from misconfigurations in AD CS, which can lead to credential theft, privilege escalation, and domain persistence. Key attack vectors include certificate theft, malicious enrollments, and misconfigured certificate templates that can be manipulated to elevate privileges or forge certificates. While AD CS itself is not inherently insecure, its complexity and frequent misconfigurations pose significant risks. |
Risks: Misconfiguration, Over Permissive Roles & Privilege Escalation CVEs: |
|
Keywords: Active Directory, Certificate Services, Microsoft, Persistence, Vulnerabilities, Privilege Escalation Affected: Microsoft, Active Directory Certificate Services |
|
| Read More | |
|
2024-09-11 Critical ICS Vulnerabilities Disclosed by Siemens, Schneider, ABB, and CISALearn about critical vulnerabilities in industrial control systems and the importance of robust security measures to protect against potential threats. |
|
|
Siemens, Schneider Electric, ABB, and CISA have issued advisories addressing numerous vulnerabilities in industrial control systems (ICS). Siemens highlighted critical flaws, including an authentication bypass in its Industrial Edge Management and remote code execution vulnerabilities in Simatic products. Schneider Electric detailed a high-severity privilege escalation in Vijeo Designer, while ABB reported medium-severity denial-of-service issues in Relion protection relays. CISA's advisories included critical vulnerabilities in Viessmann Climate Solutions SE, involving hardcoded credentials and command injection, as well as other high-severity issues in various ICS products. These vulnerabilities underscore the ongoing need for robust security measures in ICS environments. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Hardcoded Secrets, Web App & API Vulnerability CVEs: |
|
Keywords: ICS vulnerabilities, Siemens advisories, Schneider Electric, ABB security, CISA advisories, Industrial Edge Management, Simatic products, Vijeo Designer Affected: Siemens, Schneider Electric, ABB, CISA, Industrial Edge Management, Simatic products, Scalance W products, Vijeo Designer, Relion protection relays, Viessmann Climate Solutions SE, SpiderControl SCADA Web Server, Rockwell Automation SequenceManager, BPL Medical Technologies Android applications |
|
| Read More | |
|
2024-09-11 SonicWall SSLVPN Vulnerability Exploited by CybercriminalsLearn about the critical importance of patch management to protect against vulnerabilities in widely used network devices. |
|
|
Cybercriminals, including Akira ransomware operators, are exploiting a recently fixed access control flaw in SonicOS, which affects SonicWall's SSLVPN feature. This vulnerability could allow unauthorized access to resources and potentially crash the firewall, removing network protections. While SonicWall has not detailed the exploitation methods, similar vulnerabilities have been used to gain initial network access. SonicWall devices, often exposed to the internet for remote VPN access, have been frequent targets for attackers. Users are urged to apply patches promptly to mitigate these risks. |
Risks: Patch Management, Shadow IT/Exposed Assets, Malware CVEs: CVE-2024-40766 |
|
Keywords: SonicWall, SSLVPN, Akira ransomware, CVE-2024-40766, network security, vulnerability exploitation Affected: SonicWall, SonicOS, SonicWall SSLVPN, SonicWall SonicOS management access, SonicWall Secure Mobile Access (SMA) |
|
| Read More | |
|
2024-09-11 Microsoft Patches Four Zero-Day Vulnerabilities in September 2024 UpdateLearn about the critical importance of timely patch management and how it can protect against actively exploited vulnerabilities in widely-used Microsoft systems. |
|
|
Microsoft's September 2024 Patch Tuesday addressed four zero-day vulnerabilities and 79 flaws, including seven critical ones that involve remote code execution or privilege escalation. The four zero-days were actively exploited and included vulnerabilities in Windows Installer, Windows Mark of the Web, Microsoft Publisher, and Windows Update. The flaws allowed attackers to gain system privileges, bypass security features, and execute remote code. Notably, the Windows Update vulnerability affected older Windows 10 versions, causing certain components to revert to their original versions, which could potentially reintroduce previously fixed issues. |
Risks: Zero-Day, Patch Management, Over Permissive Roles & Privilege Escalation CVEs: CVE-2024-38014; CVE-2024-38217; CVE-2024-38226; CVE-2024-43491 |
|
Keywords: Microsoft, Zero-Day, Patch Tuesday, Vulnerabilities, Windows Update, Remote Code Execution Affected: Windows Installer, Windows Mark of the Web, Microsoft Publisher, Windows Update, Active Directory Lightweight Directory Services, XPS Viewer, Internet Explorer 11, LPD Print Service, IIS, Windows Media Player |
|
| Read More | |
|
2024-09-10 Cisco Online Store Breached Due to Magento VulnerabilityLearn about the critical importance of timely patch management to protect your clients from data-stealing attacks. |
|
|
In a recent cybersecurity incident, Cisco's online store selling branded merchandise was compromised in a Magecart attack due to a critical vulnerability in Adobe's Magento platform. This flaw, rated 9.8 in severity, allowed attackers to inject data-stealing JavaScript, potentially exposing customers' credit card information and other sensitive data during transactions. Despite Adobe patching the vulnerability in June, many eCommerce sites had not updated their systems, leaving them vulnerable to such exploits. Cisco has since addressed the issue, ensuring the security of their online store. |
Risks: Patch Management, Web App & API Vulnerability, Sensitive Data CVEs: CVE-2024-34102 |
|
Keywords: Magecart, Cisco, Adobe Magento, Data Breach, Vulnerability Exploit Affected: Cisco, Adobe Magento |
|
| Read More | |
|
2024-09-10 Critical Vulnerabilities Discovered in IBM webMethods Integration ServerLearn about the critical vulnerabilities threatening integration platforms and understand the importance of securing enterprise environments. |
|
|
IBM has disclosed multiple critical vulnerabilities in its webMethods Integration Server that could allow attackers to execute arbitrary commands, posing a severe risk to organizations using this platform. The most critical vulnerability allows authenticated users to upload and execute files, with a high potential for exploitation due to low attack complexity and no user interaction needed. Another vulnerability enables privilege escalation, while a third allows directory traversal attacks, potentially exposing sensitive information. These issues underscore the importance of securing integration platforms, which are crucial in enterprise environments and increasingly targeted by cyber attackers. |
Risks: Patch Management, Over Permissive Roles & Privilege Escalation, Web App & API Vulnerability CVEs: CVE-2024-45076; CVE-2024-45075; CVE-2024-45074; |
|
Keywords: IBM, webMethods, Integration Server, vulnerabilities, CVE-2024-45076, command execution, privilege escalation Affected: IBM webMethods Integration Server |
|
| Read More | |
|
2024-09-09 Critical RCE Vulnerability Found in Progress LoadMaster ProductsLearn about the critical importance of patch management and how vulnerabilities in widely used software like LoadMaster can impact security. |
|
|
Progress Software has released an urgent patch for a critical vulnerability in its LoadMaster and LoadMaster Multi-Tenant Hypervisor products, which could enable attackers to remotely execute commands by exploiting an improper input validation flaw. This security issue allows unauthenticated attackers to send specially crafted HTTP requests to the management interface, leading to arbitrary command execution on affected systems. The vulnerability has been addressed by sanitizing user input, but the fix does not cover the free version of LoadMaster, leaving it exposed to potential exploitation. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2024-7591 |
|
Keywords: Progress Software, LoadMaster, RCE, Vulnerability, CVE-2024-7591, Input Validation Affected: Progress Software, LoadMaster, LoadMaster Multi-Tenant Hypervisor |
|
| Read More | |
|
2024-09-09 Critical Vulnerabilities Found in Baxter Connex Health PortalNeed some FUD to showcase the critical importance of securing healthcare data? Discover how unchecked vulnerabilities can lead to serious breaches. |
|
|
The Baxter Connex Health Portal is affected by critical vulnerabilities, including SQL Injection and Improper Access Control, which can be exploited remotely with low attack complexity. These security flaws may allow attackers to execute malicious code, disrupt database services, and access, modify, or delete sensitive data. It is crucial to implement defensive measures to reduce the risk of exploitation, such as minimizing network exposure and ensuring systems are not accessible from the internet. |
Risks: Web App & API Vulnerability, Sensitive Data CVEs: CVE-2024-6795; CVE-2024-6796 |
|
Keywords: Baxter, Connex Health Portal, SQL Injection, Access Control, Healthcare Security Affected: Baxter, Connex Health Portal |
|
| Read More | |
|
2024-09-08 Avis Experiences Data Breach Exposing Customer InformationLearn about the critical importance of implementing robust security measures to prevent data breaches and protect customer information. |
|
|
Avis, the car rental giant, recently disclosed a data breach affecting customers. The breach occurred when an attacker gained unauthorized access to a business application from August 3 to August 6, leading to the theft of customers' personal information, including names and other sensitive data. Avis has since reinforced its security measures but has not provided further details about the breach. |
Risks: Sensitive Data, Web App & API Vulnerability, Weak or Compromised Credentials CVEs: |
|
Keywords: Avis, Data Breach, Customer Information, Unauthorized Access, Security Measures Affected: Avis |
|
| Read More | |
|
2024-09-06 Veeam Releases Patches for Critical Vulnerabilities in Backup and Management SoftwareLearn about the critical importance of timely patch management and how to protect against vulnerabilities in key software systems like Veeam. |
|
|
Veeam has released security updates addressing 18 vulnerabilities, including five critical ones. These critical issues involve vulnerabilities in Veeam Backup & Replication, Veeam ONE, and Veeam Service Provider Console that allow remote code execution and unauthorized access to sensitive information. The updates also resolve 13 other high-severity vulnerabilities that could lead to privilege escalation and bypassing multi-factor authentication. Organizations using these Veeam products are advised to apply the updates promptly to safeguard their systems. |
Risks: Patch Management, Remote Code Execution, Weak or Compromised Credentials CVEs: CVE-2024-40711; CVE-2024-42024; CVE-2024-42019; CVE-2024-38650 |
|
Keywords: Veeam, Vulnerabilities, Remote Code Execution, Patch Management, Data Protection Affected: Veeam Backup & Replication, Veeam ONE, Veeam Service Provider Console |
|
| Read More | |
|
2024-09-06 GitHub Actions Exposed to Typosquatting AttacksGot you some real good FUD, learn about the dangers of supply chain attacks through GitHub Actions typosquatting. |
|
|
GitHub Actions, a CI/CD platform, is vulnerable to typosquatting attacks where threat actors exploit minor typing errors made by developers to run malicious code. This attack method allows adversaries to publish malicious GitHub Actions by creating accounts with temporary emails. If developers mistakenly reference these malicious actions due to typos, their workflows could be compromised, leading to tampered source code, stolen secrets, and malware delivery. This low-cost, high-impact attack poses significant risks to software supply chains, as it can affect multiple projects and downstream customers. |
Risks: Supply Chain, Open Source, Malware CVEs: |
|
Keywords: GitHub Actions, Typosquatting, Supply Chain Attack, Open Source Security, CI/CD Vulnerability Affected: GitHub Actions, PyPI, npm, Maven Central, NuGet, RubyGems, Crate |
|
| Read More | |
|
2024-09-06 DrayTek Software Vulnerabilities Exploited Due to Unpatched SystemsLearn about the critical role of timely patch management and how unpatched vulnerabilities can be exploited, emphasizing the need for proactive cybersecurity measures. |
|
|
The article discusses two vulnerabilities in DrayTek VigorConnect, a management software for network equipment, which have been added to CISA's Known Exploited Vulnerabilities catalog. These vulnerabilities, identified in 2021, allow attackers to download files with root privileges. Despite being patched in October 2021, the flaws are still exploited due to organizations' lack of timely patching, underscoring the importance of regular updates to safeguard against threats. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2021-20123; CVE-2021-20124 |
|
Keywords: DrayTek, VigorConnect, path traversal, CISA KEV, unpatched vulnerabilities Affected: DrayTek, DrayTek VigorConnect |
|
| Read More | |
|
2024-09-06 GeoServer Vulnerability Exploited for Malware DeploymentLearn about the critical need for securing open-source tools and the potential impact of unpatched vulnerabilities in cloud environments. |
|
|
A critical vulnerability in OSGeo GeoServer GeoTools has been exploited by attackers to deliver various malware, including cryptocurrency miners, botnet malware, and a backdoor known as SideWalk. This remote code execution flaw allows attackers to take control of affected systems, utilizing them to establish connections with command-and-control servers and execute further malicious activities. Attack chains have been observed deploying a shell script to download binaries for different architectures, extracting and connecting to encrypted configuration servers, and using tools like Fast Reverse Proxy to maintain persistent access and evade detection. |
Risks: Remote Code Execution, Malware, Open Source, Web App & API Vulnerability CVEs: CVE-2024-36401 |
|
Keywords: GeoServer, Remote Code Execution, SideWalk Backdoor, Cryptocurrency Miners, Botnet Malware Affected: OSGeo GeoServer GeoTools, ARM, MIPS, X86 |
|
| Read More | |
|
2024-09-06 White House Launches Campaign to Address Cybersecurity Talent ShortageDiscover how the growing demand for cybersecurity professionals can create new opportunities for partnerships and expansions in the cybersecurity field. |
|
|
The White House has launched the Service for America campaign, a two-month initiative to address the significant shortage of cybersecurity professionals in the United States. With around 500,000 open cyber jobs and growing demand due to technological advancements like artificial intelligence, the campaign aims to encourage Americans to consider careers in cybersecurity as a form of national service. |
Risks: Other CVEs: |
|
Keywords: cyber talent gap, Service for America, White House initiative, cybersecurity careers, workforce development Affected: |
|
| Read More | |
|
2024-09-06 Critical Vulnerability in SonicWall SonicOS Threatens SecurityNeed some ammo against SonicWall? This article highlights vulnerabilities in their systems, offering a strategic edge for CloudGuard solutions. |
|
|
SonicWall has urged users to update their systems to patch a critical security flaw in SonicOS, which is potentially being actively exploited. This vulnerability affects the management access and SSLVPN features, potentially allowing unauthorized access and causing firewall crashes. The flaw, with a high severity score, highlights the importance of updating to the latest software versions to mitigate risks. While specific exploitation methods are not detailed, the history of similar vulnerabilities being targeted suggests a significant threat. |
Risks: Patch Management, Web App & API Vulnerability CVEs: CVE-2024-40766 |
|
Keywords: SonicWall, SonicOS, Firewall Vulnerability, SSLVPN, CVE-2024-40766 Affected: SonicWall, SonicOS, SSLVPN |
|
| Read More | |
|
2024-09-06 Critical Vulnerability Found in WordPress LiteSpeed Cache PluginLearn about the risks of plugin vulnerabilities and how securing WordPress sites can protect against unauthorized access and potential breaches. |
|
|
Researchers have identified a critical security flaw in the LiteSpeed Cache plugin for WordPress, which could enable unauthenticated users to take over accounts, potentially even gaining Administrator access. This vulnerability arises due to a publicly exposed debug log file that could reveal sensitive information, such as user cookies, allowing attackers to hijack active sessions. This issue was discovered during a comprehensive security review of the plugin, which had previously uncovered another severe vulnerability. |
Risks: Web App & API Vulnerability, Sensitive Data, Over Permissive Roles & Privilege Escalation CVEs: CVE-2024-44000; CVE-2024-28000 |
|
Keywords: WordPress, LiteSpeed Cache, Vulnerability, CVE-2024-44000, Account Takeover Affected: WordPress, LiteSpeed Cache |
|
| Read More | |
|
2024-09-05 Cisco Uncovers Critical Backdoor Vulnerability in Smart Licensing UtilityNeed some ammo against Cisco? Learn about the vulnerabilities impacting their systems and the importance of robust security measures. |
|
|
Cisco has disclosed a critical vulnerability in its Smart Licensing Utility, which allows attackers to remotely access systems using a backdoor administrative account. Additionally, a separate vulnerability could enable attackers to access sensitive data by exploiting the system's API. These issues are part of a pattern, as Cisco has previously addressed similar vulnerabilities in other products. Recent patches have also fixed severe vulnerabilities in various Cisco systems, including issues that allowed unauthorized password changes and malware installation on switches, as well as zero-day exploits targeting government networks. |
Risks: Hardcoded Secrets, Web App & API Vulnerability, Weak or Compromised Credentials CVEs: CVE-2024-20439; CVE-2024-20440; CVE-2024-20419; CVE-2024-20399 |
|
Keywords: Cisco, Smart Licensing Utility, Backdoor Vulnerability, CVE-2024-20439, Information Disclosure Affected: Cisco Smart Licensing Utility, Cisco Smart Software Manager On-Prem, Cisco Digital Network Architecture Center, Cisco IOS XE, Cisco Wide Area Application Services, Cisco Emergency Responder, Cisco NX-OS, Cisco MDS switches, Cisco Nexus switches |
|
| Read More | |
|
2024-09-05 Revival Hijack: New Supply Chain Attack Targets Python PackagesGot you some real good FUD, learn about the dangers of supply chain attacks and the vulnerabilities lurking in widely used Python packages. |
|
|
A new supply chain attack technique called Revival Hijack targets the Python Package Index (PyPI) registry by exploiting the re-registration of removed packages. This method allows attackers to hijack over 22,000 packages, potentially leading to widespread distribution of malicious software. The attack is more effective than typosquatting and involves attackers registering removed packages under their own accounts and publishing malicious versions. Revival Hijack has already been used in the wild, demonstrating a significant risk to developers who might inadvertently install compromised packages during updates. |
Risks: Supply Chain, Open Source CVEs: |
|
Keywords: Revival Hijack, PyPI attack, supply chain vulnerability, Python package security, software re-registration Affected: Python Package Index, PyPI, pip |
|
| Read More | |
|
2024-09-04 Vulnerabilities Found in Ninja Forms and Fluent Forms Affect Over 1.1 Million WordPress SitesLearn about the risks of unpatched WordPress plugins and highlight the importance of proactive vulnerability management to safeguard cloud environments. |
|
|
Two widely used WordPress contact form plugins, Ninja Forms and Fluent Forms, affecting over 1.1 million installations collectively, have been found to contain separate security vulnerabilities. Ninja Forms is susceptible to a reflected cross-site scripting attack due to a failure in escaping a URL, while Fluent Forms has a vulnerability that allows unauthorized API modifications because of an insufficient capability check. The latter requires an attacker to have subscriber-level authorization, which can be exploited on sites with subscriber registration enabled. |
Risks: Web App & API Vulnerability, Over Permissive Roles & Privilege Escalation, Patch Management CVEs: CVE-2024-7354; CVE-2024-5053 |
|
Keywords: WordPress, Ninja Forms, Fluent Forms, XSS Vulnerability, API Exploit, Plugin Security Affected: Ninja Forms, Fluent Forms |
|
| Read More | |
|
2024-09-04 CBIZ Experiences Data Breach Due to Web VulnerabilityLearn about the critical importance of robust cybersecurity measures to protect sensitive customer data and prevent costly breaches. |
|
|
CBIZ experienced a cyberattack between June 2 and June 21, during which sensitive customer data was stolen due to a vulnerability in their web infrastructure. This breach underscores the critical need for organizations to protect personal identifiable information (PII) and implement strong cybersecurity measures to prevent such incidents. Specific details about the vulnerability and any resulting actions or fines remain undisclosed. |
Risks: Sensitive Data, Web App & API Vulnerability CVEs: |
|
Keywords: CBIZ, data breach, web vulnerability, customer data, PII protection Affected: CBIZ |
|
| Read More | |
|
2024-09-04 Critical Vulnerability Found in VMware FusionLearn about the critical importance of timely patch management to prevent system compromises and service disruptions. |
|
|
VMware has addressed a high-severity code execution vulnerability in its Fusion product, caused by an insecure environment variable, which could lead to system compromise. Additionally, the update includes an OpenSSL upgrade to version 3.0.14, resolving vulnerabilities that could cause denial-of-service conditions or slow down affected applications. |
Risks: Patch Management, Open Source CVEs: CVE-2024-38811 |
|
Keywords: VMware Fusion, CVE-2024-38811, code execution, OpenSSL, patch management Affected: VMware Fusion, OpenSSL |
|
| Read More | |
|
2024-09-03 CBIZ Data Breach Exposes Sensitive Client InformationLearn about the risks of web vulnerabilities and the critical importance of proactive security measures to protect customer data. |
|
|
CBIZ Benefits & Insurance Services recently disclosed a data breach that affected around 36,000 individuals due to a vulnerability on one of its web pages. The breach allowed unauthorized access to sensitive information, including names, contact details, Social Security numbers, and health and welfare plan details, between June 2 and June 21, 2024. Discovered on June 24, the breach led CBIZ to notify affected clients starting August 28, 2024, and offer them two years of credit monitoring and identity theft protection services. While no misuse of the stolen data has been detected, the company advises clients to take additional precautions such as credit freezes and fraud alerts. |
Risks: Sensitive Data, Web App & API Vulnerability CVEs: |
|
Keywords: CBIZ, Data Breach, Web Vulnerability, Identity Theft Protection, Client Data Exposure Affected: CBIZ Benefits & Insurance Services |
|
| Read More | |
|
2024-09-02 Roblox Developers Targeted by Malicious npm Packages Mimicking noblox.jsGot you some real good FUD, learn about the dangers of supply chain attacks. |
|
|
Roblox developers are being targeted by a malicious campaign using fake npm packages that mimic the popular 'noblox.js' library to compromise systems. These packages, published by threat actors, aim to steal sensitive data and deliver malware, including a stealer known as Luna Token Grabber and a remote access trojan called Quasar RAT. The attack, first documented in August 2023, employs techniques like starjacking to appear legitimate and serves additional payloads from a GitHub repository. |
Risks: Malware, Supply Chain, Open Source CVEs: |
|
Keywords: Roblox, npm packages, noblox.js, supply chain attack, malware, Luna Token Grabber, Quasar RAT Affected: Roblox, npm |
|
| Read More | |
|
2024-09-01 Persistence Techniques Used by Threat Actors on Linux SystemsNeed some FUD? Learn about the advanced persistence techniques threat actors use on Linux systems and how CloudGuard can help secure these environments. |
|
|
Threat actors employ a variety of advanced techniques to maintain persistence on Linux systems, including manipulating init systems like System V and Upstart, leveraging run control scripts such as rc.local, and exploiting Message of the Day (MOTD) files. They also misuse udev rules, which are part of the Linux device management system, and take advantage of package managers like APT, YUM, and DNF for persistent access. Additionally, threat actors exploit Git hooks and pager configurations to execute arbitrary code, abuse process capabilities to escalate privileges, and hijack system binaries to run malicious code. These tactics highlight the diverse methods used to ensure continued access and control over compromised Linux environments. |
Risks: Over Permissive Roles & Privilege Escalation, Malware, Open Source CVEs: |
|
Keywords: Linux persistence, System V, Upstart, rc.local, udev, APT, YUM, DNF, Git hooks, binary hijacking Affected: Linux, System V, Upstart, rc.local, udev, APT, YUM, DNF, Git |
|
| Read More | |
|
2024-08-31 Vulnerabilities Found in Popular WordPress Themes Betheme and EnfoldLearn about the critical importance of patch management and proactive vulnerability assessment in safeguarding WordPress environments. |
|
|
Two popular WordPress themes, Betheme and Enfold, available on ThemeForest with over 500,000 sales, have been found vulnerable to security exploits. Betheme suffers from a high-severity PHP Object Injection vulnerability, allowing attackers with contributor-level access to inject malicious PHP objects, potentially leading to arbitrary file deletion and code execution. A patch for Betheme has been released but not yet acknowledged by Wordfence. The Enfold theme has a medium-severity Stored Cross-Site Scripting (XSS) vulnerability, which remains unpatched, allowing similar-level attackers to inject harmful scripts. Users are advised to update Betheme and consider replacing or mitigating risks associated with Enfold. |
Risks: Patch Management, Web App & API Vulnerability CVEs: |
|
Keywords: WordPress, Betheme, Enfold, PHP Object Injection, Cross-Site Scripting, Theme Vulnerability Affected: WordPress, Betheme, Enfold |
|
| Read More | |