Intellawatch

Thinkware Cloud APK Vulnerability Allows Code Execution With Elevated Privileges cyber

from

GBHackers On Security

This can expose personal information, including login credentials, which could then be exploited to gain unauthorized access to the cloud service containing sensitive video and audio footage from dashcams, as per a report by George Chen shared in Medium. Thinkware acknowledged the report on November 13, 2024, and confirmed that it had been forwarded to their mobile app development team for assessment. Additionally, users should be cautious about using unsecured or public networks where MitM att....

The cyber threat landscape part 5: Staying safe with multi-layered defense cyber

from

Intigriti

Pentesters, for example, might test a shiny new customer portal but completely miss critical vulnerabilities in interconnected systems that fall outside of their designated scope. Vulnerability scanning, meanwhile, is adept at flagging known issues but falls short when it comes to identifying complex, multi-step attack chains that a persistent hacker might discover. They act as an ongoing, real-world test of your security, helping identify weaknesses that may not be obvious or detectable throug....

AI chatbot startup WotNot leaks 346,000 files, including passports and medical records breach

from

Graham Cluley

Ahmedabad-headquartered WotNot left a massive collection of sensitive user information - including scans of passport and identity documents, medical records, resumes, travel itineraries and more - unsecured in a misconfigured Google Cloud Storage bucket. However, we regretfully missed thoroughly verifying its accessibility, which inadvertently left the data exposed." Frankly, it shouldn't matter if you are a non-paying user of WotNot or an organisation like Merck or the University of California....

The Role of Predictive Analytics in Preventing Cyber Attacks cyber

from

SOC Radar Blog

Cookies are small text files stored on your computer or mobile device by the websites you visit. Some types of persistent cookies can be used to provide personalized recommendations based on your usage purposes. They measure the effectiveness of advertisements shown to visitors and calculate how many times ads are displayed.....

A Guide to Unrestricted Resource Consumption cyber

from

SecureLayer7

Third-party actors can exploit it to request excessive amounts of resources like memory, CPU time, or bandwidth without taking into account appropriate constraints, disrupting a system’s functioning. Use a solution that makes it easy to limit memory, CPU, number of restarts, file descriptors, and processes such as Containers / Serverless code (e.g., Lambdas). Establishing clear boundaries for data size helps ensure that APIs remain responsive and can handle legitimate requests without succumbin....

I-O DATA Routers Command Injection Vulnerabilities Actively Exploited in Attacks cyber

from

GBHackers On Security

I-O DATA DEVICE, INC. has announced that several critical vulnerabilities in their UD-LT1 and UD-LT1/EX routers are being actively exploited. Below is a detailed look at each vulnerability, its potential impact, and the solutions provided. I-O DATA DEVICE, INC. has acknowledged the vulnerabilities and is actively working to provide effective solutions.....

ChatGPT Next Web Vulnerability Let Attackers Exploit Endpoint to Perform SSRF cyber

from

GBHackers On Security

This vulnerability has raised concerns within the cybersecurity community due to its potential for exploitation through Server-Side Request Forgery (SSRF). It provides a platform for users to interact with advanced AI models like ChatGPT. It affects versions of NextChat 2.11.2 and earlier, as per a report by the S2W Threat Intelligence Center.....

Dear CEO: It’s time to rethink security leadership and empower your CISO cyber

from

CSO Online

“We’ve never seen a time like this where so many quality CISOs are considering stepping back from the role. It allows us to align security strategies with business goals, identify risks before they become roadblocks, and ensure that opportunities are pursued without unnecessary exposure. As a CEO, you set the tone for how security is viewed within your organization.....

Preparing for Q-day: The essential role of cloud migration in securing enterprise data cyber

from

Help Net Security

Unlike past security challenges and because the exact date of Q-day is still unknown, this quantum threat demands a proactive approach. The question enterprises are asking is “who is best placed to help deliver protection to this and other threats from quantum computing?” Cloud hyperscalers each invest billions of dollars per year in security for their customers and are already investing in quantum-safe security measures, positioning the cloud as an essential shield against quantum threats. Thi....

Is the tide turning on macOS security? cyber

from

CSO Online

AI-assisted malware allows even novices to deploy threats that would have been out of their league just a few years ago. Users should also rely on trusted sources, such as the Mac App Store, when downloading software and double-check permissions required by installed apps. Tools such as endpoint detection and response (EDR) software or reputable antivirus solutions can provide an additional layer of protection.....

How the Shadowserver Foundation helps network defenders with free intelligence feeds cyber

from

Help Net Security

By providing actionable intelligence we help equip CSIRTs and network defenders worldwide with the information needed to secure their networks and/or constituencies. For the development of new internet-wide scans, we would typically test our scan methodology thoroughly first, to ensure accuracy before deploying in production. Despite generally being better at sharing actionable information as a community, we are still lagging behind the attackers, and not responding quickly enough.....

Building trust in tokenized economies cyber

from

Help Net Security

Share As the tokenized economy expands, the digital landscape is reshaped by decentralized systems and new forms of asset ownership. In this Help Net Security video, Jeremy Bradley, COO of Zama, explores the emerging privacy-preserving technologies that can help solve this challenge, focusing on Fully Homomorphic Encryption ( FHE), which enables data to remain encrypted even during processing, positioning it as a potential cornerstone for secure, decentralized environments.....

Cisco NX-OS Vulnerability Allows Attackers to Bypass Image Signature Verification cyber

from

GBHackers On Security

A critical vulnerability has been identified in the bootloader of Cisco NX-OS Software, potentially allowing attackers to bypass image signature verification. By executing specific bootloader commands, an attacker can bypass the image signature verification process, a crucial security measure designed to ensure that only authenticated software is executed on network devices. Organizations using Cisco NX-OS Software should prioritize reviewing their systems for vulnerabilities and apply necessar....

Five Flaws in Lorex 2K Security Cameras Enable Hackers to Take Full Control, PoC Published cyber

from

Penetration Testing Online

Rapid7’s findings detail five vulnerabilities that work in tandem to achieve remote code execution (RCE). These vulnerabilities, affecting various components of the device, are categorized into two phases: The compromised devices can be used as entry points for broader network attacks.....

Veeam Backup & Replication Vulnerabilities Exposed: High-Severity Flaws Put Data at Risk cyber

from

Penetration Testing Online

Veeam Software, a prominent provider of backup, recovery, and data management solutions, has released a security update to address multiple vulnerabilities in its Veeam Backup & Replication software. CVE-2024-45204: Exploits insufficient permissions in credential handling, potentially leading to the leakage of NTLM hashes. Exploiting this flaw allows DLL injection when directories writable by untrusted users are added to the PATH environment variable.....

Exploit Code Available: Critical Flaw Found in WhatsUp Gold- CVE-2024-8785 (CVSS 9.8) cyber

from

Penetration Testing Online

Tenable’s latest vulnerability analysis has exposed a critical flaw, CVE-2024-8785, in WhatsUp Gold versions prior to 24.0.1. For example, as Tenable describes, “ The attacker can add a element in WhatsUpPlatform-PluginManifest.xml to start an attacker-controlled executable.” Organizations relying on affected versions of WhatsUp Gold face significant operational and security risks.....

CVE-2024-51378 (CVSS 10): Critical CyberPanel Flaw Under Active Attack, CISA Warns cyber

from

Penetration Testing Online

The Cybersecurity and Infrastructure Security Agency (CISA) has warned about a critical vulnerability in CyberPanel, an open-source web hosting control panel. This flaw, tracked as CVE-2024-51378, is being actively exploited by attackers to deploy ransomware, including strains like PSAUX, C3RB3R, and a variant of Babuk. Because CyberPanel is often accessible over the public internet, organizations that haven’t taken steps to restrict access are particularly vulnerable.....

Fuji Electric Indonesia Suffers Ransomware Attack: Business Partner Data Potentially Leaked breach

from

Penetration Testing Online

The attack was first detected on November 27, 2024, when some systems within FEID became inaccessible. Efforts to strengthen cybersecurity will extend across its global operations, including both domestic and international subsidiaries. While the investigation continues, Fuji Electric plans to contact potentially affected business partners individually.....

CVE-2024-10905 (CVSS 10): Critical Vulnerability in SailPoint IdentityIQ Exposes Sensitive Data cyber

from

Penetration Testing Online

This could include sensitive configuration files, application code, and potentially even user data. SailPoint has released e-fixes to address this vulnerability for all supported versions of IdentityIQ. Organizations using any of the affected versions are strongly urged to apply these patches immediately.....

NCA’s Operation Destabilise: Dismantling a Global Money Laundering Network cyber

from

Penetration Testing Online

This operation exposed the intricate connections between Russian elites seeking to circumvent sanctions, cybercriminals laundering illicit proceeds, and organized crime groups engaged in traditional criminal activities. This group, known for its attacks targeting critical infrastructure and essential services, exemplifies the real-world consequences of cyber-enabled financial crime. Furthermore, the operation revealed how these networks enabled Russian actors to bypass financial restrictions an....

TA: 66729 TP: 3337 CP: 13