Intellawatch

Smashing Security podcast #396: Dishy DDoS dramas, and mining our minds for data cyber

from

Graham Cluley

Then, we’ll journey into the world of bossware and “affective computing” and explore how AI is learning to read our emotions – is this the future of work, or a recipe for dystopia? BlackBerry – Tune in and empower your team with the knowledge to stay connected, no matter what crisis. ThreatLocker – the Zero Trust endpoint protection platform that provides enterprise-level cybersecurity to organizations globally.....

CISA Warns of Zyxel Firewalls, CyberPanel, North Grid, & ProjectSend Flaws Exploited in Wild cyber

from

GBHackers On Security

This flaw facilitates an authentication bypass, allowing attackers to execute arbitrary commands through shell metacharacters in the statusfile property. This vulnerability allows attackers to download or upload files using crafted URLs, aligning with CWE-22, which involves path traversal concerns. Organizations using Zyxel firewalls, CyberPanel, North Grid, or ProjectSend are advised to prioritize system updates and mitigation efforts.....

Where There’s Smoke, There’s Fire - Mitel MiCollab CVE-2024-35286, CVE-2024-41713 And An 0day cyber

from

watchTowr Labs - Blog

Just naturally going through the process of clicking buttons and proxying requests we can see references to hardcoded file names embedded in URL-encoded XML data. Gone are the days of 'plain old' telephone lines, running ATM or some other guaranteed-bandwidth TDM protocol to achieve high-availability - everything nowadays goes over IP. While this obviously brings great convenience in administration, it also risks exposing all those soft squishy protocols that were formerly only accessible from ....

Q&A with Jonathan Armstrong: An Inside Look at CREST Accreditation cyber

from

NetSPI

Companies could start by conducting a thorough internal assessment of their current resilience capabilities, focusing on key areas like incident response, system recovery, and business continuity. Engaging with external experts early in this process could be valuable helping companies to identify gaps and strengthen their operational resilience before regulatory scrutiny. With the upcoming DORA regulation taking effect in January, CREST’s role is becoming increasingly significant, as a mechanis....

Operation Digital Eye | Chinese APT Compromises Critical Digital Infrastructure via Visual Studio Code Tunnels cyber

from

SentinelLabs

From late June to mid-July 2024, a suspected China-nexus threat actor targeted large business-to-business IT service providers in Southern Europe, an activity cluster that we dubbed ‘Operation Digital Eye’. We identified multiple PHPsert variants, which have been submitted to malware sharing platforms since May 2023, from various locations including Japan, Singapore, Peru, Taiwan, Iran, Korea, and the Philippines. The abuse of Visual Studio Code Remote Tunnels in this campaign illustrates how C....

The Ultimate Guide to the CCSP cyber

from

Help Net Security

ISC2 Sponsored December 5, 2024 Share Share....

Russia-linked APT Secret Blizzard spotted using infrastructure of other threat actors cyber

from

Security Affairs

....

Our secret ingredient for reverse engineering cyber

from

Securelist

Again, the hrtng plugin makes this process very simple with its Turn on APIHashes scan feature, which automatically searches disassembled and decompiled code for API function name hashes. Nevertheless, the hrtng plugin implements a more robust alternative of FLIRT called MSIG, which is based on decompiled rather than disassembled code, and we can leverage it to successfully recognize functions in our binary. We certainly wouldn’t have been able to do all that so efficiently without hrtng – this....

Resizing Persistent Volume Claims (PVCs) for OpenSearch in Kubernetes: Challenges and Solutions cyber

from

SOC Prime

They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites.....

HackSynth An Autonomous Penetration Testing Framework For Simulating Cyber-Attacks cyber

from

GBHackers On Security

HackSynth is an autonomous penetration testing agent that leverages Large Language Models (LLMs) to solve Capture The Flag (CTF) challenges without human intervention. Command usage varies across models, with Qwen2-72B exhibiting a tendency for elevated privilege commands, highlighting potential security risks. It is a promising automated penetration testing framework that can be further enhanced by incorporating specialized modules for visual data analysis, internet searches, and interactive t....

OpenSearch: How to Update index-pattern in “Broken” Visualization cyber

from

SOC Prime

They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites. They do not store directly personal information, but are based on uniquely identifying your browser and internet device. They may be used by those companies to build a profile of your interests and show you relevant adverts on other sites.....

Protecting Against API Security Misconfigurations with Regular Audits cyber

from

SecureLayer7

In today’s interconnected digital ecosystem, APIs are integral to modern software development, serving as the conduits for data interactions between various systems. This blog delves into how regular API security audits can effectively mitigate these risks, reinforcing your application’s defenses. Security audits not only identify existing loopholes but also ensure compliance with industry standards and regulations like the GDPR or PCI DSS.....

Shape the future of UK cyber security cyber

from

The Register - Security

Partner Content The opportunity to identify, foster and nurture talented young people towards a cyber security career should always be grabbed with both hands. They're looking for companies which can step up and sponsor the competition in a range of ways, from offering financial support, to mentoring students, or delivering training opportunities. You can get more information about sponsorship opportunities and benefits by registering your interest at this link.....

Is secure boot on the main application processor enough? cyber

from

Pen Test Partners

Focus on secure boot for the main processor; it can provide adequate security in many cases. A dedicated attacker can replace the processor with one of their own that does not perform secure boot. Ideally, each individual processor in a device would be able to perform secure boot, but often this is not the case.....

Russian hackers hijack Pakistani hackers' servers for their own attacks cyber

from

BleepingComputer

The threat actors have a long history of secretive cyber-espionage campaigns targeting governments, organizations, and research facilities worldwide since at least 1996. Lumen comments that this is particularly easy to perform in threat actor environments as nation-state groups cannot protect themselves using state-of-the-art security tools. At the same time, Turla stole data from OilRig's systems, including keylogger logs, directory listings, files, account credentials, and malware builders fo....

CISA Adds Three Critical Vulnerabilities to KEV Catalog: Immediate Action Urged cyber

from

The Cyber Express

The newly added vulnerabilities include CVE-2023-45727, which affects North Grid Proself and is related to an improper restriction of XML External Entity (XXE) reference. Once authenticated, attackers can make unauthorized changes to the system configuration, including creating new user accounts, uploading malicious content (such as webshells), or embedding harmful JavaScript. To mitigate these vulnerabilities, organizations must prioritize patch management, strengthen authentication practices,....

LogicGate helps organizations quantify the value of GRC programs cyber

from

Help Net Security

LogicGate acts as a true partner throughout this process, empowering enterprises to accurately assess their own unique financial values associated with improving GRC efficiency and effectiveness. By doing so, program leaders can align with GRC best practices and avoid common KPI pitfalls to confidently measure—then optimize—program performance. These capabilities provide organizations with a complete, contextualized financial understanding of their GRC activities, enabling more strategic and in....

Fuji Electric Indonesia Hit by Ransomware Attack breach

from

GBHackers On Security

This involved shutting down affected systems to prevent further damage and initiating an investigation with the aid of cybersecurity experts. Ransomware attacks have become increasingly prevalent, targeting not just corporate entities but also critical infrastructure across sectors. Fuji Electric has committed to keeping its customers and partners informed as it progresses through the recovery process.....

Tenable Patch Management prevents problematic updates cyber

from

Help Net Security

Vulnerability remediation remains a critical challenge as identifying, testing and installing the countless patches released every day is cumbersome. The result is that organizations are exposed for long periods of time, as attackers’ average time-to-exploitation has shrunk from 32 days to five. “Organizations can accurately remediate exposures, streamlining the time from discovery to remediation all while in full control.....

Abusing AD-DACL: WriteDacl cyber

from

Hacking Articles

This overview equips security professionals with critical insights to recognize and defend against these prevalent threats. In the Advanced security settings box, double-click on Komal user’s permission entry. It can be achieved from UNIX-like system with net, a tool for the administration of samba and cifs/smb clients.....

TA: 66729 TP: 3337 CP: 12